TeleAdapt RoomCast TA-2400 up to 3.1 Roomcast Application Roomcast.apk hard-coded password
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.2 | $0-$5k | 0.00 |
A vulnerability classified as critical has been found in TeleAdapt RoomCast TA-2400 up to 3.1. Affected is an unknown function of the file Roomcast.apk of the component Roomcast Application. The manipulation with an unknown input leads to a hard-coded password vulnerability. CWE is classifying the issue as CWE-259. The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
TeleAdapt RoomCast TA-2400 1.0 through 3.1 suffers from Use of a Hard-coded Password (PIN): 385521, 843646, and 592671.The RoomCast TA-2400 has multiple management modes built into it. These management modes are hard coded into the RoomCast application and so are the passwords which are used to access the management modes. The management modes can be used to make configuration changes to the RoomCast like: Changing the network settings, enabling and disabling features, launching a terminal session on the android node and configuring chromecast settings.
The weakness was published 07/26/2023 by Nolia Research with jTag Labs as vulnerability report (Packetstorm). The advisory is shared for download at packetstormsecurity.com. The public release has been coordinated with the vendor. The RoomCast TA-2400, versions 1.0-3.1+, has multiple critical security vulnerabilities, including clear-text storage of sensitive information within executables, improper access control, improper privilege management, and the use of hard-coded passwords. Uniting these vulnerabilities paves the way for a complete compromise of the device and, in turn, exposes clients to direct threats from those exploiting the compromised unit. This vulnerability is traded as CVE-2023-33744. There are known technical details, but no exploit is available. The MITRE ATT&CK project declares the attack technique as T1078.001. The passwords for the RoomCast management modes are hard coded into the RoomCast.apk application. The passwords for these management modes are publicly available in the RoomCast documentation. The passwords are the same for all RoomCast devices.
The Passwords can be located in the following publicly available documentation: Per-room Configuration Instructions: http://rc.teleadapt.com/index.php/9-documentation/14-per-room-configuration { Engineering Mode (Not Cool + Whatever + Love It then 592671); Admin Mode (Struggled + Struggled then 843646); Hotel Mode (Struggled + Struggled then 385521); }
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔒VulDB CVSS-BT Score: 🔒
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 7.2
VulDB Base Score: 6.3
VulDB Temp Score: 6.3
VulDB Vector: 🔒
VulDB Reliability: 🔍
Researcher Base Score: 5.9
Researcher Vector: 🔒
NVD Base Score: 9.8
NVD Vector: 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Researcher Base Score: 🔒
Exploiting
Class: Hard-coded passwordCWE: CWE-259 / CWE-255
CAPEC: 🔒
ATT&CK: 🔒
Local: No
Remote: Partially
Availability: 🔒
Status: Not defined
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔒
Timeline
05/22/2023 CVE reserved07/26/2023 Advisory disclosed
07/28/2023 VulDB entry created
03/28/2024 VulDB entry last update
Sources
Advisory: 173764Researcher: Nolia Research
Organization: jTag Labs
Status: Not defined
Coordinated: 🔒
CVE: CVE-2023-33744 (🔒)
Entry
Created: 07/28/2023 07:04Updated: 03/28/2024 08:18
Changes: 07/28/2023 07:04 (34), 07/30/2023 07:16 (19), 07/30/2023 07:17 (21), 07/31/2023 07:18 (3), 08/20/2023 14:17 (6), 08/20/2023 14:22 (11), 03/28/2024 08:18 (2)
Complete: 🔍
Committer: jTag Labs
Submit
Duplicate
- Submit #185321: RoomCast TA-2400 - CVE-2023-33744 - Use of Hard-coded Password (by jTag Labs)
No comments yet. Languages: en.
Please log in to comment.