{ "schema_version": "1.4.0", "id": "GHSA-7q22-vf3p-qvwp", "modified": "2025-05-15T15:31:08Z", "published": "2022-10-13T12:00:26Z", "aliases": [ "CVE-2022-40187" ], "details": "Foresight GC3 Launch Monitor 1.3.15.68 ships with a Target Communication Framework (TCF) service enabled. This service listens on a TCP port on all interfaces and allows for process debugging, file system modification, and terminal access as the root user. In conjunction with a hosted wireless access point and the known passphrase of FSSPORTS, an attacker could use this service to modify a device and steal intellectual property.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40187" }, { "type": "WEB", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2022-0003.md" }, { "type": "WEB", "url": "https://wiki.eclipse.org/TCF" }, { "type": "WEB", "url": "https://www.bushnellgolf.com/products/launch-monitors/launch-pro" }, { "type": "WEB", "url": "https://www.foresightsports.com/gc3" } ], "database_specific": { "cwe_ids": [ "CWE-276" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-10-13T01:15:00Z" } }