Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-10630


For Crestron TSW-X60 version prior to 2.001.0037.001 and MC3 version prior to 1.502.0047.001, The devices are shipped with authentication disabled, and there is no indication to users that they need to take steps to enable it. When compromised, the access to the CTP console is left open.


Published

2018-08-10T19:29:00.240

Last Modified

2024-11-21T03:41:41.853

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-284
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System crestron tsw-x60_firmware < 2.001.0037.001 Yes
Hardware crestron tsw-1060-b-s - No
Hardware crestron tsw-1060-nc-b-s - No
Hardware crestron tsw-1060-nc-w-s - No
Hardware crestron tsw-1060-w-s - No
Hardware crestron tsw-560-b-s - No
Hardware crestron tsw-560-nc-b-s - No
Hardware crestron tsw-560-nc-w-s - No
Hardware crestron tsw-560-w-s - No
Hardware crestron tsw-760-b-s - No
Hardware crestron tsw-760-nc-b-s - No
Hardware crestron tsw-760-nc-w-s - No
Hardware crestron tsw-760-w-s - No
Operating System crestron mc3_firmware < 1.502.0047.001 Yes
Hardware crestron mc3 - No

References