### [CVE-2019-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3932) ![](https://img.shields.io/static/v1?label=Product&message=Crestron%20AirMedia&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-249%20Hard-coded%20Password&color=brighgreen) ### Description Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to authentication bypass due to a hard-coded password in return.tgi. A remote, unauthenticated attacker can use this vulnerability to control external devices via the uart_bridge. ### POC #### Reference - https://www.tenable.com/security/research/tra-2019-20 #### Github No PoCs found on GitHub currently.