cve/2019/CVE-2019-3932.md
2024-06-18 02:51:15 +02:00

18 lines
779 B
Markdown

### [CVE-2019-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3932)
![](https://img.shields.io/static/v1?label=Product&message=Crestron%20AirMedia&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-249%20Hard-coded%20Password&color=brighgreen)
### Description
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to authentication bypass due to a hard-coded password in return.tgi. A remote, unauthenticated attacker can use this vulnerability to control external devices via the uart_bridge.
### POC
#### Reference
- https://www.tenable.com/security/research/tra-2019-20
#### Github
No PoCs found on GitHub currently.