Show filters
40 Total Results
Displaying 1-10 of 40
Sort by:
Attacker Value
Unknown

CVE-2023-6926

Disclosure Date: January 23, 2024 (last updated January 30, 2024)
There is an OS command injection vulnerability in Crestron AM-300 firmware version 1.4499.00018 which may enable a user of a limited-access SSH session to escalate their privileges to root-level access.
Attacker Value
Unknown

CVE-2023-38405

Disclosure Date: July 17, 2023 (last updated October 08, 2023)
On Crestron 3-Series Control Systems before 1.8001.0187, crafting and sending a specific BACnet packet can cause a crash.
Attacker Value
Unknown

CVE-2022-40298

Disclosure Date: September 23, 2022 (last updated February 24, 2025)
Crestron AirMedia for Windows before 5.5.1.84 has insecure inherited permissions, which leads to a privilege escalation vulnerability found in the AirMedia Windows Application, version 4.3.1.39. A low privileged user can initiate a repair of the system and gain a SYSTEM level shell.
Attacker Value
Unknown

CVE-2022-34102

Disclosure Date: September 13, 2022 (last updated February 24, 2025)
Insufficient access control vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can pause the uninstallation of an executable to gain a SYSTEM level command prompt.
Attacker Value
Unknown

CVE-2022-34101

Disclosure Date: September 13, 2022 (last updated February 24, 2025)
A vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can place a malicious DLL in a certain path to execute code and preform a privilege escalation attack.
Attacker Value
Unknown

CVE-2022-34100

Disclosure Date: September 13, 2022 (last updated October 08, 2023)
A vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a low-privileged user can gain a SYSTEM level command prompt by pre-staging a file structure prior to the installation of a trusted service executable and change permissions on that file structure during a repair operation.
Attacker Value
Unknown

CVE-2022-23178

Disclosure Date: January 15, 2022 (last updated February 23, 2025)
An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields.
Attacker Value
Unknown

CVE-2020-16839

Disclosure Date: July 30, 2021 (last updated February 23, 2025)
On Crestron DM-NVX-DIR, DM-NVX-DIR80, and DM-NVX-ENT devices before the DM-XIO/1-0-3-802 patch, the password can be changed by sending an unauthenticated WebSocket request.
Attacker Value
Unknown

CVE-2019-18184

Disclosure Date: November 27, 2019 (last updated November 27, 2024)
Crestron DMC-STRO 1.0 devices allow remote command execution as root via shell metacharacters to the ping function.
Attacker Value
Unknown

CVE-2019-3932

Disclosure Date: April 30, 2019 (last updated November 27, 2024)
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to authentication bypass due to a hard-coded password in return.tgi. A remote, unauthenticated attacker can use this vulnerability to control external devices via the uart_bridge.