CVE-2018-11228

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to execute arbitrary code on affected Crestron touchscreen devices via a Bash shell service in the Crestron Toolbox Protocol. Organizations using Crestron TSW series devices in building automation, conference rooms, or control systems are affected. The CVSS 9.8 score indicates critical severity.

💻 Affected Systems

Products:
  • Crestron TSW-1060
  • TSW-760
  • TSW-560
  • TSW-1060-NC
  • TSW-760-NC
  • TSW-560-NC
Versions: All versions before 2.001.0037.001
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Devices must have Crestron Toolbox Protocol (CTP) enabled, which is typically enabled by default for remote management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of device leading to lateral movement into corporate networks, data exfiltration, or disruption of building automation systems.

🟠

Likely Case

Unauthenticated attackers gain shell access to install malware, pivot to other systems, or disrupt device functionality.

🟢

If Mitigated

Isolated devices with network segmentation prevent exploitation and limit impact to local system only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to port 41794/TCP (CTP) and knowledge of the protocol. Public exploit code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.001.0037.001

Vendor Advisory: https://support.crestron.com/app/answers/answer_view/a_id/5471

Restart Required: Yes

Instructions:

1. Download firmware 2.001.0037.001 from Crestron support portal. 2. Upload firmware to device via web interface or Toolbox. 3. Apply update and restart device.

🔧 Temporary Workarounds

Disable CTP Service

all

Disable Crestron Toolbox Protocol service to prevent exploitation.

Access device web interface > Settings > Network > Services > Disable CTP

Network Segmentation

all

Isolate Crestron devices on separate VLAN with strict firewall rules.

🧯 If You Can't Patch

  • Segment network: Place Crestron devices on isolated VLAN with no internet access.
  • Implement strict firewall rules: Block port 41794/TCP from untrusted networks.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface: Settings > About. If version is below 2.001.0037.001, device is vulnerable.

Check Version:

curl -s http://<device_ip>/cgi-bin/version.cgi | grep Firmware

Verify Fix Applied:

Confirm firmware version is 2.001.0037.001 or higher. Test CTP service with nmap: nmap -p 41794 <device_ip> should show filtered/closed if workaround applied.

📡 Detection & Monitoring

Log Indicators:

  • Unusual connections to port 41794
  • Bash shell spawn events in system logs
  • Unauthorized configuration changes

Network Indicators:

  • Unexpected traffic to/from port 41794/TCP
  • CTP protocol anomalies
  • Shell reverse connections from device

SIEM Query:

source_port:41794 OR dest_port:41794 OR process:bash AND device_type:crestron

🔗 References

📤 Share & Export