CVE-2019-3932

Severity CVSS v4.0:
Pending analysis
Type:
CWE-798 Use of Hard-coded Credentials
Publication date:
30/04/2019
Last modified:
06/12/2022

Description

Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to authentication bypass due to a hard-coded password in return.tgi. A remote, unauthenticated attacker can use this vulnerability to control external devices via the uart_bridge.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:*
cpe:2.3:h:crestron:am-100:-:*:*:*:*:*:*:*
cpe:2.3:o:crestron:am-101_firmware:2.7.0.2:*:*:*:*:*:*:*
cpe:2.3:h:crestron:am-101:-:*:*:*:*:*:*:*


References to Advisories, Solutions, and Tools