Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to authentication bypass due to a hard-coded password in return.tgi. A remote, unauthenticated attacker can use this vulnerability to control external devices via the uart_bridge.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2019-20 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: tenable
Published: 2019-04-30T20:30:02
Updated: 2019-04-30T20:30:02
Reserved: 2019-01-03T00:00:00
Link: CVE-2019-3932
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-04-30T21:29:00.900
Modified: 2022-12-06T21:06:31.957
Link: CVE-2019-3932
JSON object: View
Redhat Information
No data.