Remote Code Execution Vulnerability in Crestron Touch Screen Devices
CVE-2018-11228

9.8CRITICAL

Key Information:

Vendor

Crestron

Vendor
CVE Published:
8 June 2018

What is CVE-2018-11228?

Crestron TSW series touch screen devices, including TSW-1060, TSW-760, and TSW-560 models, are susceptible to an unauthenticated remote code execution flaw due to a vulnerability in the Crestron Toolbox Protocol (CTP). Devices running firmware versions prior to 2.001.0037.001 can be exploited remotely, allowing attackers to gain unauthorized control over the devices through the Bash shell service. This vulnerability poses a significant security risk, enabling malicious actors to execute arbitrary commands without user interaction.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

EPSS Score

7% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.