Описание
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to authentication bypass due to a hard-coded password in return.tgi. A remote, unauthenticated attacker can use this vulnerability to control external devices via the uart_bridge.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:*
cpe:2.3:h:crestron:am-100:-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:o:crestron:am-101_firmware:2.7.0.2:*:*:*:*:*:*:*
cpe:2.3:h:crestron:am-101:-:*:*:*:*:*:*:*
EPSS
Процентиль: 92%
0.083
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-249
CWE-798
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to authentication bypass due to a hard-coded password in return.tgi. A remote, unauthenticated attacker can use this vulnerability to control external devices via the uart_bridge.
EPSS
Процентиль: 92%
0.083
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-249
CWE-798