ID

VAR-201608-0082


CVE

CVE-2016-5669


TITLE

Crestron Electronics DM-TXRX-100-STR web interface contains multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#974424

DESCRIPTION

Crestron Electronics DM-TXRX-100-STR devices with firmware before 1.3039.00040 use a hardcoded 0xb9eed4d955a59eb3 X.509 certificate from an OpenSSL Test Certification Authority, which makes it easier for remote attackers to conduct man-in-the-middle attacks against HTTPS sessions by leveraging the certificate's trust relationship. Crestron Electronics DM-TXRX-100-STR, version 1.2866.00026 and earlier, has a web management interface which contains multiple vulnerabilities, including authentication bypass, failure to restrict access to authorized users, use of hard-coded certificate, default credentials, and cross-site request forgery (CSRF). These vulnerabilities may be leveraged to gain complete control of affected devices. Supplementary information : CWE Vulnerability type by CWE-321: Use of Hard-coded Cryptographic Key ( Using hard-coded encryption keys ) Has been identified. Crestron Electronics DM-TXRX-100-STR is prone to the following multiple security vulnerabilities: 1. Multiple authentication-bypass vulnerabilities 2. Multiple security-bypass vulnerabilities 3. A cross-site request-forgery vulnerability An attacker can exploit these issues to bypass certain security restrictions, perform certain unauthorized actions , bypass the authentication mechanism and compromise the application; This may aid in further attacks. Crestron Electronics DM-TXRX-100-STR, version 1.2866.00026 and prior versions are vulnerable. Crestron Electronics DM-TXRX-100-STR is a stream encoder/decoder product from Crestron Electronics, USA

Trust: 2.7

sources: NVD: CVE-2016-5669 // CERT/CC: VU#974424 // JVNDB: JVNDB-2016-004130 // BID: 92211 // VULHUB: VHN-94488

AFFECTED PRODUCTS

vendor:crestronmodel:dm-txrx-100-strscope:eqversion:1.2866.00026

Trust: 1.6

vendor:crestronmodel: - scope: - version: -

Trust: 0.8

vendor:crestronmodel:dm-txrx-100-strscope: - version: -

Trust: 0.8

vendor:crestronmodel:dm-txrx-100-strscope:ltversion:1.3039.00040

Trust: 0.8

vendor:crestronmodel:electronics dm-txrx-100-strscope:eqversion:1.2866.00026

Trust: 0.3

vendor:crestronmodel:electronics dm-txrx-100-strscope:neversion:1.3039.00040

Trust: 0.3

sources: CERT/CC: VU#974424 // BID: 92211 // JVNDB: JVNDB-2016-004130 // CNNVD: CNNVD-201608-006 // NVD: CVE-2016-5669

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5669
value: CRITICAL

Trust: 1.0

NVD: CVE-2016-5669
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201608-006
value: MEDIUM

Trust: 0.6

VULHUB: VHN-94488
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-5669
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-94488
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-5669
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-94488 // JVNDB: JVNDB-2016-004130 // CNNVD: CNNVD-201608-006 // NVD: CVE-2016-5669

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2016-004130 // NVD: CVE-2016-5669

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201608-006

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201608-006

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004130

PATCH

title:DM-TXRX-100-STRurl:https://www.crestron.com/downloads/pdf/spec_sheets/commercial_and_residential/dm-txrx-100-str.pdf

Trust: 0.8

title:Resource Libraryurl:http://www.crestron.com/resources/resource-library/firmware

Trust: 0.8

title:Crestron Electronics DM-TXRX-100-STR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63407

Trust: 0.6

sources: JVNDB: JVNDB-2016-004130 // CNNVD: CNNVD-201608-006

EXTERNAL IDS

db:CERT/CCid:VU#974424

Trust: 3.6

db:NVDid:CVE-2016-5669

Trust: 2.8

db:BIDid:92211

Trust: 1.4

db:JVNid:JVNVU93291811

Trust: 0.8

db:JVNDBid:JVNDB-2016-004130

Trust: 0.8

db:CNNVDid:CNNVD-201608-006

Trust: 0.7

db:VULHUBid:VHN-94488

Trust: 0.1

sources: CERT/CC: VU#974424 // VULHUB: VHN-94488 // BID: 92211 // JVNDB: JVNDB-2016-004130 // CNNVD: CNNVD-201608-006 // NVD: CVE-2016-5669

REFERENCES

url:http://www.kb.cert.org/vuls/id/974424

Trust: 2.8

url:https://www.crestron.com/downloads/pdf/spec_sheets/commercial_and_residential/dm-txrx-100-str.pdf

Trust: 1.1

url:http://www.securityfocus.com/bid/92211

Trust: 1.1

url:https://cwe.mitre.org/data/definitions/603.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/425.html

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/306.html

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/321.html

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/255.html

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/352.html

Trust: 0.8

url:https://www.crestron.com/resources/resource-library/firmware

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5669

Trust: 0.8

url:http://jvn.jp/vu/jvnvu93291811/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5669

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/bluu-a9cmty

Trust: 0.8

url:https://www.censys.io/certificates/51ab293c9fe391eeeb1a2739de15cd8029e3033142962c6c386f2da78d03a945

Trust: 0.8

sources: CERT/CC: VU#974424 // VULHUB: VHN-94488 // BID: 92211 // JVNDB: JVNDB-2016-004130 // CNNVD: CNNVD-201608-006 // NVD: CVE-2016-5669

CREDITS

Carsten Eiram of Risk Based Security

Trust: 0.6

sources: CNNVD: CNNVD-201608-006

SOURCES

db:CERT/CCid:VU#974424
db:VULHUBid:VHN-94488
db:BIDid:92211
db:JVNDBid:JVNDB-2016-004130
db:CNNVDid:CNNVD-201608-006
db:NVDid:CVE-2016-5669

LAST UPDATE DATE

2025-04-13T23:21:06.929000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#974424date:2016-08-01T00:00:00
db:VULHUBid:VHN-94488date:2016-08-15T00:00:00
db:BIDid:92211date:2016-08-01T00:00:00
db:JVNDBid:JVNDB-2016-004130date:2016-08-04T00:00:00
db:CNNVDid:CNNVD-201608-006date:2016-08-05T00:00:00
db:NVDid:CVE-2016-5669date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#974424date:2016-08-01T00:00:00
db:VULHUBid:VHN-94488date:2016-08-03T00:00:00
db:BIDid:92211date:2016-08-01T00:00:00
db:JVNDBid:JVNDB-2016-004130date:2016-08-04T00:00:00
db:CNNVDid:CNNVD-201608-006date:2016-08-04T00:00:00
db:NVDid:CVE-2016-5669date:2016-08-03T01:59:07.693