Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices before 2.001.0037.001 allow unauthenticated remote code execution via a Bash shell service in Crestron Toolbox Protocol (CTP).
References
Link | Resource |
---|---|
https://support.crestron.com/app/answers/answer_view/a_id/5471/~/the-latest-details-from-crestron-on-security-and-safety-on-the-internet | Vendor Advisory |
https://ics-cert.us-cert.gov/advisories/ICSA-18-221-01 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/105051 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2018-06-07 18:29
Updated : 2019-05-02 07:48
NVD link : CVE-2018-11228
Mitre link : CVE-2018-11228
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
crestron
- tsw-1060-nc
- crestron_toolbox_protocol_firmware
- tsw-760-nc
- tsw-760
- tsw-1060
- tsw-560-nc
- dmc-str
- tsw-560