CVE-2019-3938
Summary
| CVE | CVE-2019-3938 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-04-30 21:29:00 UTC |
| Updated | 2022-12-06 20:52:00 UTC |
| Description | Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 stores usernames, passwords, and other configuration options in the file generated via the "export configuration" feature. The configuration file is encrypted using the awenc binary. The same binary can be used to decrypt any configuration file since all the encryption logic is hard coded. A local attacker can use this vulnerability to gain access to devices username and passwords. |
Risk And Classification
Problem Types: CWE-798
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Crestron | Am-100 | - | All | All | All |
| Hardware | Crestron | Am-100 | - | All | All | All |
| Operating System | Crestron | Am-100 Firmware | 1.6.0.2 | All | All | All |
| Operating System | Crestron | Am-100 Firmware | 1.6.0.2 | All | All | All |
| Hardware | Crestron | Am-101 | - | All | All | All |
| Hardware | Crestron | Am-101 | - | All | All | All |
| Operating System | Crestron | Am-101 Firmware | 2.7.0.2 | All | All | All |
| Operating System | Crestron | Am-101 Firmware | 2.7.0.2 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| OEM Presentation Platform Vulnerabilities - Research Advisory | Tenable® | MISC | www.tenable.com | Exploit, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.