First published: Fri Jun 08 2018(Updated: )
Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices before 2.001.0037.001 allow unauthenticated remote code execution via a Bash shell service in Crestron Toolbox Protocol (CTP).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Crestron Crestron Toolbox Protocol Firmware | <2.001.0037.001 | |
Crestron Dmc-str | ||
Crestron TSW-1060 | ||
Crestron Tsw-1060-nc | ||
Crestron Tsw-560 | ||
Crestron Tsw-560-nc | ||
Crestron Tsw-760 | ||
Crestron Tsw-760-nc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Crestron vulnerability is CVE-2018-11228.
CVE-2018-11228 has a severity rating of 9.8 (Critical).
Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices before version 2.001.0037.001 are affected by CVE-2018-11228.
An attacker can exploit CVE-2018-11228 by performing unauthenticated remote code execution via a Bash shell service in Crestron Toolbox Protocol (CTP).
Yes, a patch is available for CVE-2018-11228. It is recommended to update affected devices to version 2.001.0037.001 or later.