Description
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-13517 | Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2019-02 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-04T19:26:26.668Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3910
No data.
Status : Modified
Published: 2019-01-18T18:29:00.417
Modified: 2024-11-21T04:42:50.777
Link: CVE-2019-3910
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD