CVE-2023-6926

There is an OS command injection vulnerability in Crestron AM-300 firmware version 1.4499.00018 which may enable a user of a limited-access SSH session to escalate their privileges to root-level access.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-023-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:crestron:am-300_firmware:1.4499.00018:*:*:*:*:*:*:*
cpe:2.3:h:crestron:am-300:-:*:*:*:*:*:*:*

History

29 Jan 2024, 20:56

Type Values Removed Values Added
First Time Crestron am-300 Firmware
Crestron am-300
Crestron
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-023-02 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-023-02 - Third Party Advisory, US Government Resource
CWE CWE-78
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:crestron:am-300_firmware:1.4499.00018:*:*:*:*:*:*:*
cpe:2.3:h:crestron:am-300:-:*:*:*:*:*:*:*

23 Jan 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-23 20:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-6926

Mitre link : CVE-2023-6926

CVE.ORG link : CVE-2023-6926


JSON object : View

Products Affected

crestron

  • am-300_firmware
  • am-300
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')