CVE-2019-3932
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
30/04/2019
Last modified:
06/12/2022
Description
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to authentication bypass due to a hard-coded password in return.tgi. A remote, unauthenticated attacker can use this vulnerability to control external devices via the uart_bridge.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:h:crestron:am-100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:crestron:am-101_firmware:2.7.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:h:crestron:am-101:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



