CVE-2020-16839
📋 TL;DR
This vulnerability allows unauthenticated attackers to change passwords on Crestron DM-NVX devices via WebSocket requests. It affects Crestron DM-NVX-DIR, DM-NVX-DIR80, and DM-NVX-ENT devices before firmware patch DM-XIO/1-0-3-802. Organizations using these devices for AV/IT systems are at risk.
💻 Affected Systems
- Crestron DM-NVX-DIR
- Crestron DM-NVX-DIR80
- Crestron DM-NVX-ENT
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device takeover allowing attackers to reconfigure systems, intercept AV streams, pivot to internal networks, or deploy ransomware on connected systems.
Likely Case
Unauthorized password changes leading to device lockout, service disruption, or credential harvesting for further attacks.
If Mitigated
Limited impact with proper network segmentation and monitoring, though authentication bypass remains possible.
🎯 Exploit Status
Simple WebSocket request manipulation required. No authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: DM-XIO/1-0-3-802
Vendor Advisory: https://www.crestron.com/Software-Firmware/Firmware/DigitalMedia/DM-XIO/1-0-3-802
Restart Required: Yes
Instructions:
1. Download DM-XIO/1-0-3-802 firmware from Crestron support site. 2. Upload firmware to device via web interface. 3. Apply update. 4. Reboot device. 5. Verify firmware version.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Crestron devices on separate VLAN with strict firewall rules.
WebSocket Interface Restriction
allBlock WebSocket traffic (port 80/443) to devices except from management systems.
🧯 If You Can't Patch
- Segment network: Place devices on isolated VLAN with strict access controls.
- Monitor logs: Alert on WebSocket authentication attempts and password change events.
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface: Settings > System Information. If version is below DM-XIO/1-0-3-802, device is vulnerable.
Check Version:
Via web interface navigation or Crestron Toolbox software connection.
Verify Fix Applied:
Confirm firmware version shows DM-XIO/1-0-3-802 or higher in System Information.
📡 Detection & Monitoring
Log Indicators:
- WebSocket connection attempts from unauthorized IPs
- Password change events without prior authentication
- Failed authentication followed by successful WebSocket request
Network Indicators:
- WebSocket traffic to device ports 80/443 from unexpected sources
- Unusual pattern of WebSocket handshake requests
SIEM Query:
source="crestron_device" AND (event_type="password_change" OR protocol="websocket") AND NOT user="authenticated"
🔗 References
- https://support.crestron.com
- https://www.crestron.com/Software-Firmware/Firmware/DigitalMedia/DM-XIO/1-0-3-802
- https://www.security.crestron.com
- https://www.crestron.com/Security/Security-at-Crestron
- https://support.crestron.com
- https://www.crestron.com/Software-Firmware/Firmware/DigitalMedia/DM-XIO/1-0-3-802
- https://www.security.crestron.com