Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

CISA Adds Vulnerabilities Exploitable Via Bluetooth to KEV

Updated Oct. 5: As of Oct. 4, 2023, CISA has removed the five Owl Labs vulnerabilities from KEV. CISA notes that it "is continually collaborating with partners across government and the private sector. As a result of this collaboration, CISA has concluded that there is insufficient evidence to keep the following five CVEs in the catalog and has removed them." CISA temporarily removed an entry once before due to issues with the available patch, but this appears to be the first time CISA has removed entries from KEV for other reasons.

Recently, CISA added four vulnerabilities for Owl Labs Meeting Owl devices to its Known Exploited Vulnerabilities (KEV) catalog. These vulnerabilities are exploitable via Bluetooth Low Energy (BLE). This means an attacker would need to be physically near the device in order to exploit it.

On September 18, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added eight vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including four vulnerabilities for Owl Labs Meeting Owl.

CVE

Description

CVSSv3

CVE-2022-31459

Owl Labs Meeting Owl Inadequate Encryption Strength Vulnerability

7.4

CVE-2022-31461

Owl Labs Meeting Owl Missing Authentication for Critical Function Vulnerability

7.4

CVE-2022-31462

Owl Labs Meeting Owl Use of Hard-coded Credentials Vulnerability

9.3

CVE-2022-31463

Owl Labs Meeting Owl Improper Authentication Vulnerability

8.2

The CVSS vectors for these vulnerabilities indicate the Attack Vector component is “Adjacent.” These four vulnerabilities are exploitable via Bluetooth Low Energy (BLE). This means an attacker would need to be physically near the device in order to exploit it. This is unusual for KEV entries.

What does it mean when CISA adds something to KEV?

CISA posted a blog on September 18 detailing how it prioritizes additions to the KEV catalog. It cites three criteria:

  1. There must be a CVE
  2. CISA must have credible evidence of exploitation in the wild
  3. There needs to be some sort of effective mitigation

The first and the third are fairly straightforward. For the second, the CISA blog notes that its “analysts need evidence that threat actors are actively exploiting the vulnerability in the wild. This evidence needs to be from a credible source — a known industry partner, a trusted security researcher, or a government partner.”

CISA KEV adds four vulnerabilities affecting Owl Labs devices to

(Image source: Owl Labs, Sept. 22, 2022)

What are the Owl Labs vulnerabilities?

The vulnerabilities were identified by modzero on June 3, 2022 and affect the Meeting Owl device itself. Specifically, versions up to 5.4.2.3 are:

  • Access point / tethering mode with hardcoded credentials (CVE-2022-31460, added to the CISA KEV more than a year ago on June 8, 2022) — Owl will create a local WiFi network with hardcoded WPA passphrase and bridge that network to a corporate network. Write {"c":150} to the BLE characteristic 39D6B333-ADAD45C8-B6EE-EAC6C4CD0101 to enable AP mode. If a corporate network is configured, it will be bridged.
  • In access point mode, the internal switchboard port is exposed (no CVE issued, not added to the CISA KEV) — while in AP mode for setup TCP port 6300 is exposed on the AP interface. This service is used internally for IPC calls and may be exploitable. I believe that the steps to exploit CVE-2022-31460, above, will enable AP mode for this vulnerability. It’s unclear if the AP tethering mode is the same as the AP mode indicated here used for device setup, but it seems like it is.
  • The passcode is not required for Bluetooth commands (CVE-2022-31463) — The passcode is only validated in the companion app, but not on the device itself. Therefore, sending the same commands that the app uses via raw BLE will be successful without a passcode/PIN.
  • Hardcoded backdoor passcode (CVE-2022-31462) — the hardcoded backdoor passcode can be calculated via available information. The SHA-1 hash of the backdoor passcode is exposed via BLE.
  • Deactivation of passcode without authentication (CVE-2022-31461) — the user defined passcode for the device can be disabled via BLE. Write {"c":"11","v":{"p":"<HASH>","reset":0}} to an unspecified BLE characteristic to reset the passcode where <HASH> is the SHA-1 of the passcode. Or write {"c":"11","v":{"p":"","reset":1}} to an unspecified BLE characteristic to remove the passcode entirely. Note that ‘unspecified BLE characteristics’ are either the characteristics noted elsewhere in the document or are easily discoverable by simply enumerating BLE characteristics.
  • Passcode hash can be retrieved via Bluetooth (CVE-2022-31459) — this is similar to hardcoded backdoor above. The SHA-1 user set passcode can be retrieved and since it is only made up of digits it can be brute-forced rapidly. Writing {"c":10} to BLE characteristic 39D6B333-ADAD-45C8-B6EE-EAC6C4CD0101 allows the SHA-1 of the already set passcode to be read via 39D6B333-ADAD-45C8-B6EE-EAC6C4CD0001.

As you can see, these vulnerabilities all require an attacker to be within BLE distance of a device. Owl Labs documentation mentions that all of its devices are Bluetooth Class 1, which has an effective range of 330 feet. So, the distance within which these can be exploited may be substantial.

Owl Labs vulnerability timeline

Interestingly, these vulnerabilities were discovered over a year ago. In fact, CISA added one of them to KEV at that time.

Date

CVEs

Event

6/3/2022


CVE-2022-31459
CVE-2022-31460
CVE-2022-31461
CVE-2022-31462
CVE-2022-31463

Modzero publishes Owl Labs Meeting Owl report disclosing vulnerabilities

6/3/2022

N/A

Owl Labs updates its cloud applications to remediate modzero’s findings

6/6/2022

CVE-2022-31460

Owl Labs releases firmware version 5.4.1.4 for Meeting Owl which remediates CVE-2022-31460, disabling WiFi bridging

6/8/2022

CVE-2022-31460

CISA adds CVE-2022-31460 to KEV

6/23/2022


CVE-2022-31459
CVE-2022-31461
CVE-2022-31462
CVE-2022-31463

Owl Labs releases firmware version 5.4.2.3 for Meeting Owl which remediates CVE-2022-31459, CVE-2022-31461, CVE-2022-31462 and CVE-2022-31463

9/18/2023


CVE-2022-31459
CVE-2022-31461
CVE-2022-31462
CVE-2022-31463

CISA adds CVE-2022-31459, CVE-2022-31461, CVE-2022-31462 and CVE-2022-31463 to KEV

What would exploitation look like?

Since exploitation necessitates a device that is near the Meeting Owl, we can assume two paths: a malicious actor sitting nearby or a compromised device in the same vicinity. The first scenario is risky for the threat actor, but at a projected range of 330 feet, a parking lot or sidewalk below an office building could provide cover. A compromised device may be more likely. Laptops and cell phones are often compromised and often accompany people to meetings.

An attacker with full control of a network-connected device (e.g., laptop / cell phone) can easily exploit TCP/IP vulnerabilities, but exploiting BLE vulnerabilities is not as trivial. Traditional TCP/IP vulnerabilities can usually be exploited with commonly used tools already on the compromised device. Netcat, builtin bash functions, curl, Powershell’s Invoke-WebRequest, and more can all easily be used on a compromised computer to exploit a remote IP-based vulnerability. Attackers could use BLE enumeration apps or install command-line tools like hcitool or gatttool to dive deeper into BLE exploration, but these are not installed by default on most laptops or mobile devices. So, malware wanting to exploit BLE vulnerabilities in a remote device would need to include such capabilities or an attacker would need to write some code to use BLE APIs exposed on the compromised device. These vary across operating systems and architectures.

Credible knowledge of exploitation?

While CISA indicates it must have credible evidence that exploitation occurred before adding vulnerabilities to KEV, I’m not currently aware of any BLE vulnerabilities actually exploited in the wild. I’m also not aware of any malware that contains Bluetooth or BLE functionality. Evidence would probably look like either logs from the device or a sample of the malware with this capability. If this is true, it likely marks the first time we have such evidence of exploitation of BLE vulnerabilities.

Conclusion

These vulnerabilities are interesting and may mark the first time there’s evidence of BLE device exploitation in the wild. Their appearance on KEV should also prompt the review of the security of devices in sensitive locations like meeting rooms.

  • In a blog post, Owl Labs notes that “If your Meeting Owl (Pro or 3) is connected to Wi-Fi, you will automatically receive this update” so these devices are likely already updated. If they aren’t, make sure to patch them.
  • Consider evaluating the placement of devices that facilitate meetings in your conference rooms. Most of these devices have cameras and microphones and can access potentially sensitive information. Make sure they are kept patched and evaluate their attack surface to proximal attack.
  • Protect your endpoints. An exposure management strategy will help ensure that devices in your fleet can’t participate in an attack on proximal equipment.

Learn More

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training