Connect with us

Hi, what are you looking for?


IoT Security

Owl Labs Patches Severe Vulnerability in Video Conferencing Devices

Video conferencing company Owl Labs has released patches for a severe vulnerability affecting its Meeting Owl Pro and Whiteboard Owl devices.

Video conferencing company Owl Labs has released patches for a severe vulnerability affecting its Meeting Owl Pro and Whiteboard Owl devices.

Owl Labs’ Meeting Owl Pro features a 360° lens camera to offer a panoramic view of the conference room. It offers support for various video conferencing solutions, including Zoom, Skype, and Google Meet.

Security researchers with Modzero have identified multiple vulnerabilities in Owl’s devices, warning that they could be exploited to find registered devices worldwide and access sensitive data, or even gain access to the owners’ networks.

The researchers discovered five vulnerabilities in Meeting Owl Pro: CVE-2022-31459, CVE-2022-31460, CVE-2022-31461 (CVSS score of 7.4), CVE-2022-31463 (CVSS score of 8.2), and CVE-2022-31462 (CVSS score of 9.3).

All of these issues, the researchers say, are related to hardcoded credentials – Meeting Owl Pro creates its own Wi-Fi access point with the hardcoded passcode “hoothoot” – and impact the communication between the Meeting Owl Pro device and its companion application and backend server, as well as the web apps used for managing Meeting Owl devices.

On Monday, Owl Labs announced the availability of patches for CVE-2022-31460, a high-severity bug that allows an attacker within Bluetooth range to turn the Meeting Owl device into a rogue access point to the owner’s network.

The issue exists because, when in AP mode, the device remains connected to the Wi-Fi network and routes all traffic to the network instead of allowing only connections to the Owl itself, Modzero explains. The vulnerability can be exploited without authentication.

Advertisement. Scroll to continue reading.

On Monday, Owl Labs announced firmware version for both Meeting Owl Pro and Whiteboard Owl, to disable “the passthrough of networking traffic in Wi-Fi AP tethering mode,” thus preventing the use of these devices as wireless access points.

The remaining flaws, the company says, are expected to be resolved with future updates. The company also notes that all devices should be protected against potential exploitation attempts once updated to

“To be clear, once software version is applied, there is no risk of unauthorized network access due to the above CVEs. The Owl PIN issues are low risk and would allow someone to access per-meeting default-meeting settings only (for example: Presenter Enhance, 360-degree Pano on/off), and require them to be within Bluetooth range,” the company said.

The unresolved issues expose the device’s internal Switchboard (allowing an attacker to perform actions supported by the companion app), and allow for access to Bluetooth-exposed functionality without authentication and for the deactivation of the passcode without authentication.

The most severe of these issues, CVE-2022-31462, is the presence of a hardcoded backdoor passcode that “can be calculated from information that is visible in Bluetooth Low Energy proximity range.”

This hardcoded passcode “is the SHA-1 has representation of the devices’ software serial, which is broadcasted as the name of the Owl over Bluetooth,” the researchers explain.

On Tuesday, the US Cybersecurity and Infrastructure Security Agency (CISA) encouraged Owl device owners to update to firmware version

“Owl Labs has released security updates to address a vulnerability (CVE-2022-31460) in Meeting Owl Pro and Whiteboard Owl. An attacker could exploit this vulnerability to obtain sensitive information,” CISA said.

Related: Technical Details Released for Recently Patched Zyxel Firewall Vulnerabilities

Related: CISA Warns of Critical Vulnerabilities in Illumina Genetic Analysis Devices

Related: NSA Informs Cisco of Vulnerability Exposing Nexus Switches to DoS Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.