First published: Fri Jun 08 2018(Updated: )
Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices before 2.001.0037.001 allow unauthenticated remote code execution via command injection in Crestron Toolbox Protocol (CTP).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Crestron Crestron Toolbox Protocol Firmware | <2.001.0037.001 | |
Crestron Dmc-str | ||
Crestron TSW-1060 | ||
Crestron Tsw-1060-nc | ||
Crestron Tsw-560 | ||
Crestron Tsw-560-nc | ||
Crestron Tsw-760 | ||
Crestron Tsw-760-nc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2018-11229.
The severity of CVE-2018-11229 is critical, with a severity value of 9.8.
CVE-2018-11229 allows unauthenticated remote code execution through command injection in the Crestron Toolbox Protocol (CTP).
Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices before version 2.001.0037.001 are affected by CVE-2018-11229.
To fix the CVE-2018-11229 vulnerability, update your Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices to version 2.001.0037.001 or later.