Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 stores usernames, passwords, and other configuration options in the file generated via the "export configuration" feature. The configuration file is encrypted using the awenc binary. The same binary can be used to decrypt any configuration file since all the encryption logic is hard coded. A local attacker can use this vulnerability to gain access to devices username and passwords.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-13545 Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 stores usernames, passwords, and other configuration options in the file generated via the "export configuration" feature. The configuration file is encrypted using the awenc binary. The same binary can be used to decrypt any configuration file since all the encryption logic is hard coded. A local attacker can use this vulnerability to gain access to devices username and passwords.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2024-08-04T19:26:27.938Z

Reserved: 2019-01-03T00:00:00

Link: CVE-2019-3938

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-04-30T21:29:01.260

Modified: 2024-11-21T04:42:54.287

Link: CVE-2019-3938

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses