Barco.OEM.Presentation.Platform.Remote.Command.Injection
Description
This indicates an attack attempt against a Command Injection vulnerability in Barco OEM Presentation Platform.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when parsing HTTP requests. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted request.
Affected Products
Crestron AM-100 firmware 1.6.0.2
Crestron AM-101 firmware 2.7.0.1
Barco wePresent WiPG-1000P firmware 2.3.0.10
Barco wePresent WiPG-1600W before firmware 2.4.1.19
Extron ShareLink 200/250 firmware 2.0.3.4
Teq AV IT WIPS710 firmware 1.1.0.7
SHARP PN-L703WA firmware 1.4.2.3
Optoma WPS-Pro firmware 1.0.0.5
Blackbox HD WPS firmware 1.0.0.5
InFocus LiteShow3 firmware 1.0.16
InFocus LiteShow4 2.0.0.7
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Refer to the vendor's advisory for updates:
https://www.barco.com/en/support/software/R33050103?majorVersion=2&minorVersion=3&patchVersion=2&buildVersion=20
https://www.barco.com/en/support/software/R33050104?majorVersion=2&minorVersion=4&patchVersion=1&buildVersion=19
https://www.extron.com/download/software.aspx?filehandle=sharelink200&material=44&type=archive
https://www.crestron.com/en-US/Security/Security_Advisories
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |