#VU14300 OS command injection in Crestron Electronics products - CVE-2018-11228

 

#VU14300 OS command injection in Crestron Electronics products - CVE-2018-11228

Published: August 9, 2018 / Updated: August 10, 2018


Vulnerability identifier: #VU14300
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2018-11228
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
TSW-560-NC
TSW-760-NC
TSW-1060-NC
TSW-560
TSW-760
TSW-1060
Software vendor:
Crestron Electronics

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote unauthenticated attacker can submit a specially crafted input via a Bash shell service in Crestron Toolbox Protocol (CTP) and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Update the affected software to version 2.001.0037.001.

External links