"value":"\nThere is an OS command injection vulnerability in Crestron AM-300 firmware version 1.4499.00018 which may enable a user of a limited-access SSH session to escalate their privileges to root-level access.\n\n"
}
]
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
"value":"\n\n<span style=\"background-color: rgb(255, 255, 255);\">Crestron has resolved this vulnerability in firmware version 1.4499.00023.001 or higher. Please see </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://security.crestron.com/\">https://security.crestron.com</a><span style=\"background-color: rgb(255, 255, 255);\"> or contact True Blue Support for additional information.</span>\n\n<br>"
}
],
"value":"\nCrestron has resolved this vulnerability in firmware version 1.4499.00023.001 or higher. Please see https://security.crestron.com https://security.crestron.com/ \u00a0or contact True Blue Support for additional information.\n\n\n"