Snap One OvrC Cloud (Update A)
OvrC Pro versions prior to 7.3 contain multiple vulnerabilities in authentication, information disclosure, and device claiming mechanisms. Successful exploitation allows an attacker to impersonate and claim devices without authentication, execute arbitrary code on the platform, and disclose device information. Vulnerabilities include insufficient authentication (CWE-290, CWE-306), information exposure (CWE-204, CWE-319), and insecure UPnP configuration (CWE-420, CWE-912). These flaws affect the cloud management platform's core device registration and code execution functions.
- Network access to OvrC Pro device or cloud endpoint
- UPnP enabled (default)
- No valid credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2bf8bd99-5528-4183-944d-c212af7283c2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.