Foresight GC3 Launch Monitor 1.3.15.68 ships with a Target Communication Framework (TCF) service enabled. This service listens on a TCP port on all interfaces and allows for process debugging, file system modification, and terminal access as the root user. In conjunction with a hosted wireless access point and the known passphrase of FSSPORTS, an attacker could use this service to modify a device and steal intellectual property.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0003.md | Exploit Third Party Advisory | 
| https://wiki.eclipse.org/TCF | Third Party Advisory | 
| https://www.bushnellgolf.com/products/launch-monitors/launch-pro/ | Product | 
| https://www.foresightsports.com/gc3 | Product | 
| https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0003.md | Exploit Third Party Advisory | 
| https://wiki.eclipse.org/TCF | Third Party Advisory | 
| https://www.bushnellgolf.com/products/launch-monitors/launch-pro/ | Product | 
| https://www.foresightsports.com/gc3 | Product | 
Configurations
                    History
                    No history.
Information
                Published : 2022-10-13 01:15
Updated : 2025-05-15 15:16
NVD link : CVE-2022-40187
Mitre link : CVE-2022-40187
CVE.ORG link : CVE-2022-40187
JSON object : View
Products Affected
                foresightsports
- gc3_launch_monitor
- gc3_launch_monitor_firmware
bushnellgolf
- launch_pro
- launch_pro_firmware
CWE
                
                    
                        
                        CWE-276
                        
            Incorrect Default Permissions
