Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to authentication bypass due to a hard-coded password in return.tgi. A remote, unauthenticated attacker can use this vulnerability to control external devices via the uart_bridge.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2019-20 | Exploit Third Party Advisory |
Information
Published : 2019-04-30 14:29
Updated : 2022-12-06 13:06
NVD link : CVE-2019-3932
Mitre link : CVE-2019-3932
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
crestron
- am-100
- am-100_firmware
- am-101
- am-101_firmware