Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Multiple Vulnerabilities Found in Presentation Products

Tenable Research has discovered multiple vulnerabilities impacting Crestron’s AM-100 presentation device platform. Two of these also impact several other platforms, including: Barco wePresent, ExtronShareLink, InFocus LiteShow and TEQ AV IT WIPS710.

Background

While researching a Crestron AM-100 AirMedia Presentation Gateway, Jacob Baines discovered that this device shares a code base with several other presentation platforms. He also discovered 15 vulnerabilities in Crestron AM-100 version 1.6.0.2 and AM-101 version 2.7.0.2. Two of these vulnerabilities (CVE-2019-3929, CVE-2019-3930) are also present in: 

  • Barco wePresent WiPG-1000 firmware 2.3.0.10
  • Barco wePresent WiPG-1600 before firmware 2.4.1.19
  • Extron ShareLink 200/250 firmware 2.0.3.4 
  • Teq AV ITWIPS710 firmware 1.1.0.7 
  • InFocus LiteShow3 firmware 1.0.16 
  • SHARP PN-L703WA firmware version 1.4.2.3
  • Optoma WPS-Pro firmware version 1.0.0.5
  • Blackbox HD WPS firmware version 1.0.0.5 
  • InFocus LiteShow4 2.0.0.7

The devices on this list are also vulnerable to CVE-2017-16709, which Crestron patched in 2018.

Analysis

While researching these vulnerabilities, Baines discovered nearly 1,600 devices with this shared code base are open to the internet. He also found that many of the devices are not up to date. You can read all of his findings in the Tenable Tech Blog. Full details of the vulnerabilities in Crestron AM-100 and AM-101 can be found in the Tenable Research Advisory

CVE-2019-3929: Unauthenticated Remote Command Injection via HTTP

This is the most critical of the vulnerabilities and is present in all of the listed devices. A remote, unauthenticated attacker can execute operating system commands as root via crafted requests to the HTTP endpoint file_transfer.cgi. This would allow them to view anything being presented on the presentation device and, more importantly, use the presentation device as a pivot point to the internal network. They could also replace the client software presenters must download to connect to the device with their own malicious software, giving them access to the presenter’s device.

Vendor response 

Tenable Research attempted to coordinate with all of the impacted vendors. Barco released firmware version v2.3.1.16 and Extron has released firmware version 2.3.08 to address the vulnerabilities that impact their platforms. Update May 1: Crestron released a Security Advisory for these vulnerabilities with more information about mitigations and when fixes will be available If you deploy devices from the other vendors listed, we recommend reaching out to them directly for more information.

Solution

Ensure your devices are updated fully and are not exposed to the internet.

Tenable has developed an exploit plugin to test for CVE-2019-3929.

Additional information

Visit the Tenable Tech Blog on Medium to read researcher Jacob Baines’ in-depth story about his work uncovering these vulnerabilities.

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface. Get a free 60-day trial of Tenable.io Vulnerability Management.

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.