Vulnerability Details : CVE-2022-40187
Foresight GC3 Launch Monitor 1.3.15.68 ships with a Target Communication Framework (TCF) service enabled. This service listens on a TCP port on all interfaces and allows for process debugging, file system modification, and terminal access as the root user. In conjunction with a hosted wireless access point and the known passphrase of FSSPORTS, an attacker could use this service to modify a device and steal intellectual property.
Products affected by CVE-2022-40187
- cpe:2.3:o:foresightsports:gc3_launch_monitor_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:bushnellgolf:launch_pro_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-40187
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 23 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-40187
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.0
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.1
|
5.9
|
NIST |
CWE ids for CVE-2022-40187
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-40187
-
https://www.bushnellgolf.com/products/launch-monitors/launch-pro/
Product
-
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0003.md
advisories/ATREDIS-2022-0003.md at master · atredispartners/advisories · GitHubExploit;Third Party Advisory
-
https://www.foresightsports.com/gc3
GC3 | Foresight SportsProduct
-
https://wiki.eclipse.org/TCF
TCF - EclipsepediaThird Party Advisory
Jump to