CVE-2019-3930

CVSS V2 High 10 CVSS V3 Critical 9.8
Description
The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to a stack buffer overflow in libAwgCgi.so's PARSERtoCHAR function. A remote, unauthenticated attacker can use this vulnerability to execute arbitrary code as root via a crafted request to the return.cgi endpoint.
Overview
  • CVE ID
  • CVE-2019-3930
  • Assigner
  • vulnreport@tenable.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2019-04-30T21:29:00
  • Last Modified Date
  • 2020-10-16T18:30:20
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:crestron:am-100:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:crestron:am-101_firmware:2.7.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:crestron:am-101:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:barco:wepresent_wipg-1000p_firmware:2.3.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:barco:wepresent_wipg-1000p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:barco:wepresent_wipg-1600w_firmware:*:*:*:*:*:*:*:* 1 OR 2.4.1.19
cpe:2.3:h:barco:wepresent_wipg-1600w:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:extron:sharelink_200_firmware:2.0.3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:extron:sharelink_200:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:extron:sharelink_250_firmware:2.0.3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:extron:sharelink_250:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:teqavit:wips710_firmware:1.1.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:teqavit:wips710:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sharp:pn-l703wa_firmware:1.4.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:sharp:pn-l703wa:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:optoma:wps-pro_firmware:1.0.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:optoma:wps-pro:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:blackbox:hd_wireless_presentation_system_firmware:1.0.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:blackbox:hd_wireless_presentation_system:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:infocus:liteshow3_firmware:1.0.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:infocus:liteshow3:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:infocus:liteshow4_firmware:2.0.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:infocus:liteshow4:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 10
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://www.tenable.com/security/research/tra-2019-20 Exploit Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 17:07:10 Added to TrackCVE
2022-12-03 20:16:14 2019-04-30T21:29Z 2019-04-30T21:29:00 CVE Published Date updated
2022-12-03 20:16:14 2020-10-16T18:30:20 CVE Modified Date updated
2022-12-03 20:16:14 Analyzed Vulnerability Status updated