Show filters
40 Total Results
Displaying 1-10 of 40
Sort by:
Attacker Value
Unknown
CVE-2023-6926
Disclosure Date: January 23, 2024 (last updated January 30, 2024)
There is an OS command injection vulnerability in Crestron AM-300 firmware version 1.4499.00018 which may enable a user of a limited-access SSH session to escalate their privileges to root-level access.
0
Attacker Value
Unknown
CVE-2023-38405
Disclosure Date: July 17, 2023 (last updated October 08, 2023)
On Crestron 3-Series Control Systems before 1.8001.0187, crafting and sending a specific BACnet packet can cause a crash.
0
Attacker Value
Unknown
CVE-2022-40298
Disclosure Date: September 23, 2022 (last updated February 24, 2025)
Crestron AirMedia for Windows before 5.5.1.84 has insecure inherited permissions, which leads to a privilege escalation vulnerability found in the AirMedia Windows Application, version 4.3.1.39. A low privileged user can initiate a repair of the system and gain a SYSTEM level shell.
0
Attacker Value
Unknown
CVE-2022-34102
Disclosure Date: September 13, 2022 (last updated February 24, 2025)
Insufficient access control vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can pause the uninstallation of an executable to gain a SYSTEM level command prompt.
0
Attacker Value
Unknown
CVE-2022-34101
Disclosure Date: September 13, 2022 (last updated February 24, 2025)
A vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can place a malicious DLL in a certain path to execute code and preform a privilege escalation attack.
0
Attacker Value
Unknown
CVE-2022-34100
Disclosure Date: September 13, 2022 (last updated October 08, 2023)
A vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a low-privileged user can gain a SYSTEM level command prompt by pre-staging a file structure prior to the installation of a trusted service executable and change permissions on that file structure during a repair operation.
0
Attacker Value
Unknown
CVE-2022-23178
Disclosure Date: January 15, 2022 (last updated February 23, 2025)
An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields.
0
Attacker Value
Unknown
CVE-2020-16839
Disclosure Date: July 30, 2021 (last updated February 23, 2025)
On Crestron DM-NVX-DIR, DM-NVX-DIR80, and DM-NVX-ENT devices before the DM-XIO/1-0-3-802 patch, the password can be changed by sending an unauthenticated WebSocket request.
0
Attacker Value
Unknown
CVE-2019-18184
Disclosure Date: November 27, 2019 (last updated November 27, 2024)
Crestron DMC-STRO 1.0 devices allow remote command execution as root via shell metacharacters to the ping function.
0
Attacker Value
Unknown
CVE-2019-3932
Disclosure Date: April 30, 2019 (last updated November 27, 2024)
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to authentication bypass due to a hard-coded password in return.tgi. A remote, unauthenticated attacker can use this vulnerability to control external devices via the uart_bridge.
0