Crestron AM-100/AM-101 libAwgCgi.so PARSERtoCHAR memory corruption
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
9.7 | $0-$5k | 0.00 |
A vulnerability was found in Crestron AM-100 and AM-101. It has been declared as very critical. This vulnerability affects the function PARSERtoCHAR
of the file libAwgCgi.so. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to a stack buffer overflow in libAwgCgi.so's PARSERtoCHAR function. A remote, unauthenticated attacker can use this vulnerability to execute arbitrary code as root via a crafted request to the return.cgi endpoint.
The bug was discovered 05/01/2019. The weakness was presented 04/30/2019. This vulnerability was named CVE-2019-3930 since 01/03/2019. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Technical details are known, but there is no available exploit. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 09/11/2023).
The commercial vulnerability scanner Qualys is able to test this issue with plugin 13484 (Crestron AM-100 and AM-101 Multiple Vulnerabilities).
Proper firewalling of is able to address this issue.
See VDB-134273, VDB-134274, VDB-134275 and VDB-134276 for similar entries.
Affected
- Crestron AM-100 1.6.0.2
- Crestron AM-101 2.7.0.1
- Barco wePresent WiPG-1000P 2.3.0.10
- Barco wePresent WiPG-1600W 2.4.1
- Extron ShareLink 200/Extron ShareLink 200 250 2.0.3.4
- Teq AV IT WIPS710 1.1.0.7
- SHARP PN-L703WA 1.4.2.3
- Optoma WPS-Pro 1.0.0.5
- Blackbox HD WPS 1.0.0.5
- InFocus LiteShow3 1.0.16
- InFocus LiteShow4 2.0.0.7
Product
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.9VulDB Meta Temp Score: 9.7
VulDB Base Score: 10.0
VulDB Temp Score: 9.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: FirewallStatus: 🔍
0-Day Time: 🔍
Timeline
01/03/2019 🔍04/30/2019 🔍
05/01/2019 🔍
05/01/2019 🔍
09/11/2023 🔍
Sources
Advisory: tenable.comStatus: Confirmed
CVE: CVE-2019-3930 (🔍)
See also: 🔍
Entry
Created: 05/01/2019 02:07 PMUpdated: 09/11/2023 12:27 PM
Changes: 05/01/2019 02:07 PM (57), 06/05/2020 11:24 AM (1), 09/11/2023 12:27 PM (3)
Complete: 🔍
Cache ID: 18:B86:40
No comments yet. Languages: en.
Please log in to comment.