Page 7 of 40 results (0.006 seconds)

CVSS: 9.8EPSS: 4%CPEs: 8EXPL: 0

Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices before 2.001.0037.001 allow unauthenticated remote code execution via command injection in Crestron Toolbox Protocol (CTP). Los dispositivos Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC y TSW-560-NC en versiones anteriores a la 2.001.0037.001 permiten la ejecución remota de código sin autenticar mediante una inyección de comandos en CTP (Crestron Toolbox Protocol). This vulnerability allows remote attackers to execute arbitrary commands on vulnerable installations of Crestron Crestron's WindowCE-based products. Authentication is required to exploit this vulnerability. The specific flaw exists within the engineer built-in account that enables a hidden 'LAUNCH' command. An attacker can leverage this vulnerability to escape the CTP console's sandbox environment to execute commands with elevated privileges. • http://www.securityfocus.com/bid/105051 https://ics-cert.us-cert.gov/advisories/ICSA-18-221-01 https://support.crestron.com/app/answers/answer_view/a_id/5471/~/the-latest-details-from-crestron-on-security-and-safety-on-the-internet • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 3%CPEs: 8EXPL: 0

Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices before 2.001.0037.001 allow unauthenticated remote code execution via a Bash shell service in Crestron Toolbox Protocol (CTP). Los dispositivos Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC y TSW-560-NC en versiones anteriores a la 2.001.0037.001 permiten la ejecución remota de código sin autenticar mediante un servicio shell Bash en CTP (Crestron Toolbox Protocol). This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Crestron's Android-based products. Authentication is not required to exploit this vulnerability. The specific flaw exists within the EDIDMUX command of the CTP console. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. • http://www.securityfocus.com/bid/105051 https://ics-cert.us-cert.gov/advisories/ICSA-18-221-01 https://support.crestron.com/app/answers/answer_view/a_id/5471/~/the-latest-details-from-crestron-on-security-and-safety-on-the-internet • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

Directory traversal vulnerability in cgi-bin/login.cgi on Crestron AirMedia AM-100 devices with firmware before 1.4.0.13 allows remote attackers to read arbitrary files via a .. (dot dot) in the src parameter. Vulnerabilidad de salto de directorio en cgi-bin/login.cgi en dispositivos Crestron AirMedia AM-100 con firmware en versiones anteriores a 1.4.0.13 permite a atacantes remotos leer archivos arbitrarios a través de un .. (dot dot) en el parámetro src." Crestron AM-100 versions 1.1.1.11 through 1.2.1 suffer from hard-coded credential and path traversal vulnerabilities. • https://www.exploit-db.com/exploits/40813 https://github.com/xfox64x/CVE-2016-5639 http://www.kb.cert.org/vuls/id/603047 http://www.securityfocus.com/bid/92216 https://github.com/CylanceVulnResearch/disclosures/blob/master/CLVA-2016-05-001.md • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Crestron Electronics DM-TXRX-100-STR devices with firmware before 1.3039.00040 use a hardcoded 0xb9eed4d955a59eb3 X.509 certificate from an OpenSSL Test Certification Authority, which makes it easier for remote attackers to conduct man-in-the-middle attacks against HTTPS sessions by leveraging the certificate's trust relationship. Dispositivos Crestron Electronics DM-TXRX-100-STR con firmware en versiones anteriores a 1.3039.00040 usa un certificado codificado 0xb9eed4d955a59eb3 X.509 de un OpenSSL Test Certification Authority, lo que facilita a atacantes remotos llevar a cabo ataques man-in-the-middle contra sesiones HTTPS mediante el aprovechamiento de la relación de confianza del certificado. • http://www.kb.cert.org/vuls/id/974424 http://www.securityfocus.com/bid/92211 •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

Multiple cross-site request forgery (CSRF) vulnerabilities on Crestron Electronics DM-TXRX-100-STR devices with firmware through 1.3039.00040 allow remote attackers to hijack the authentication of arbitrary users. Múltiples vulnerabilidades de CSRF en dispositivos Crestron Electronics DM-TXRX-100-STR con firmware hasta la versión 1.3039.00040 permite a atacantes remotos secuestrar la autenticación de usuarios arbitrarios. • http://www.kb.cert.org/vuls/id/974424 http://www.securityfocus.com/bid/92211 • CWE-352: Cross-Site Request Forgery (CSRF) •