First published: Tue May 06 2025(Updated: )
Cleartext Transmission of Sensitive Information vulnerability in Crestron Automate VX allows Sniffing Network Traffic. The device allows Web UI and API access over non-secure network ports which exposes sensitive information such as user passwords. This issue affects Automate VX: from 5.6.8161.21536 through 6.4.0.49.
Credit: 25b0b659-c4b4-483f-aecb-067757d23ef3
Affected Software | Affected Version | How to fix |
---|---|---|
Crestron Automate VX | >=5.6.8161.21536<=6.4.0.49 |
Crestron recommends updating to firmware version 6.4.1.8 or higher. The firmware version will disables the use of unsecure ports for the Web UI and API.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-47419 is high due to the exposure of sensitive information such as user passwords through cleartext transmissions.
To fix CVE-2025-47419, update Crestron Automate VX to version 6.4.1.8 or later to enable secure communication.
CVE-2025-47419 affects sensitive data, including user passwords, transmitted over non-secure channels.
CVE-2025-47419 impacts Crestron Automate VX versions between 5.6.8161.21536 and 6.4.0.49.
A temporary workaround for CVE-2025-47419 includes disabling access over non-secure network ports until the software is updated.