CVE-2019-3938
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
30/04/2019
Last modified:
06/12/2022
Description
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 stores usernames, passwords, and other configuration options in the file generated via the "export configuration" feature. The configuration file is encrypted using the awenc binary. The same binary can be used to decrypt any configuration file since all the encryption logic is hard coded. A local attacker can use this vulnerability to gain access to devices username and passwords.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:h:crestron:am-100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:crestron:am-101_firmware:2.7.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:h:crestron:am-101:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



