The US Cybersecurity and Infrastructure Security Agency (CISA) recently removed five vulnerabilities affecting Owl Labs’ Meeting Owl smart video conferencing product from its Known Exploited Vulnerabilities (KEV) Catalog. The vulnerabilities, discovered by researchers at Modzero, include encryption flaws, hardcoded credentials, and authentication issues. However, CISA cited insufficient evidence of exploitation for their removal from the catalog. The vulnerabilities would require an attacker to be in Bluetooth range of the device, making it unlikely to be exploited.
The KEV Catalog is a list of known vulnerabilities that have been exploited by threat actors in the past. It is maintained by CISA and is used by federal agencies to prioritize their patching efforts. The catalog includes vulnerabilities that have been exploited in the wild and those that have not yet been exploited but are considered high-risk.
The Meeting Owl is a smart video conferencing device that uses artificial intelligence to automatically focus on the person speaking in a meeting room. Researchers at Modzero discovered five vulnerabilities in the device that could allow an attacker to control it. These include encryption flaws, hardcoded credentials, and authentication issues. However, the vulnerabilities would require an attacker to be in the Bluetooth range of the device, making it unlikely to be exploited.
CISA’s decision to remove the Meeting Owl vulnerabilities from its KEV Catalog has raised some eyebrows. While it is true that the vulnerabilities would require an attacker to be in the Bluetooth range of the device, this does not mean that they are not exploitable. In fact, researchers at Modzero were able to exploit the vulnerabilities in their lab environment. Furthermore, removing the vulnerabilities from the catalog could lead federal agencies to deprioritize patching efforts for the Meeting Owl.
While it is true that the Meeting Owl vulnerabilities would require an attacker to be in the Bluetooth range of the device, they are still exploitable. CISA’s decision to remove them from its KEV Catalog could lead federal agencies to deprioritize patching efforts for the device. It is important for organizations to remain vigilant and patch all known vulnerabilities in their systems.
“Starting October 8, we’re launching two highly-requested features in Google Meet to help you connect and engage with people on your video calls: Q&A and polls,” said Google in the blog post.
Zoombombing is an incident when your video conference calls are interrupted by unwanted/uninvited attendee and disrupts the meet.