Description
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to authentication bypass due to a hard-coded password in return.tgi. A remote, unauthenticated attacker can use this vulnerability to control external devices via the uart_bridge.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-13539 | Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to authentication bypass due to a hard-coded password in return.tgi. A remote, unauthenticated attacker can use this vulnerability to control external devices via the uart_bridge. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2019-20 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-04T19:26:27.558Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3932
No data.
Status : Modified
Published: 2019-04-30T21:29:00.900
Modified: 2024-11-21T04:42:53.503
Link: CVE-2019-3932
No data.
OpenCVE Enrichment
No data.
EUVD