10

CVE-2019-3929

Warnung
Exploit

The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CrestronAm-100 Firmware Version1.6.0.2
   CrestronAm-100 Version-
CrestronAm-101 Firmware Version2.7.0.2
   CrestronAm-101 Version-
BarcoWepresent Wipg-1000p Firmware Version2.3.0.10
   BarcoWepresent Wipg-1000p Version-
BarcoWepresent Wipg-1600w Firmware Version < 2.4.1.19
   BarcoWepresent Wipg-1600w Version-
ExtronSharelink 200 Firmware Version2.0.3.4
   ExtronSharelink 200 Version-
ExtronSharelink 250 Firmware Version2.0.3.4
   ExtronSharelink 250 Version-
TeqavitWips710 Firmware Version1.1.0.7
   TeqavitWips710 Version-
SharpPn-l703wa Firmware Version1.4.2.3
   SharpPn-l703wa Version-
OptomaWps-pro Firmware Version1.0.0.5
   OptomaWps-pro Version-
InfocusLiteshow3 Firmware Version1.0.16
   InfocusLiteshow3 Version-
InfocusLiteshow4 Firmware Version2.0.0.7
   InfocusLiteshow4 Version-

15.04.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Crestron Multiple Products Command Injection Vulnerability

Schwachstelle

Multiple Crestron products are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 93.99% 0.999
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.