Vulnerability Details CVE-2018-10630
For Crestron TSW-X60 version prior to 2.001.0037.001 and MC3 version prior to 1.502.0047.001, The devices are shipped with authentication disabled, and there is no indication to users that they need to take steps to enable it. When compromised, the access to the CTP console is left open.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 51.1%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 10.0
Products affected by CVE-2018-10630
-
-
cpe:2.3:h:crestron:tsw-1060-b-s:-
-
cpe:2.3:h:crestron:tsw-1060-nc-b-s:-
-
cpe:2.3:h:crestron:tsw-1060-nc-w-s:-
-
cpe:2.3:h:crestron:tsw-1060-w-s:-
-
cpe:2.3:h:crestron:tsw-560-b-s:-
-
cpe:2.3:h:crestron:tsw-560-nc-b-s:-
-
cpe:2.3:h:crestron:tsw-560-nc-w-s:-
-
cpe:2.3:h:crestron:tsw-560-w-s:-
-
cpe:2.3:h:crestron:tsw-760-b-s:-
-
cpe:2.3:h:crestron:tsw-760-nc-b-s:-
-
cpe:2.3:h:crestron:tsw-760-nc-w-s:-
-
cpe:2.3:h:crestron:tsw-760-w-s:-
-
cpe:2.3:o:crestron:mc3_firmware:1.502.0047.00
-
cpe:2.3:o:crestron:tsw-x60_firmware:*