CVE-2025-47415: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in CRESTRON TOUCHSCREENS x60, x70 series
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CRESTRON TOUCHSCREENS x70 allows Relative Path Traversal.This issue affects TOUCHSCREENS x70: from 3.000.0110.001 before 3.001.0031.001. Confirmed Affected Hardware: TSW-760, TSW-1060 Confirmed Affected Firmware: 3.002.1061 - (no fix released, product discontinued) For x70 The Affected Firmware:- 3.000.0110.001 and versions below The Fixed Firmware:- 3.001.0031.001
AI Analysis
Technical Summary
CVE-2025-47415 is a path traversal vulnerability classified under CWE-22 affecting Crestron Touchscreens x60 and x70 series devices, specifically confirmed on hardware models TSW-760 and TSW-1060. The vulnerability arises from improper limitation of pathname inputs, allowing an attacker to manipulate file paths to access directories and files outside the intended restricted directory scope. This can lead to unauthorized access to sensitive files or system resources. The affected firmware versions include 3.000.0110.001 and earlier, with a fixed version available at 3.001.0031.001 for the x70 series. However, some firmware such as 3.002.1061 remains vulnerable due to product discontinuation and lack of fixes. The CVSS 4.0 score is 6.8 (medium severity), indicating a network attack vector with low complexity, no privileges required but with high impact on integrity and availability, and requiring user interaction. The vulnerability does not affect confidentiality but can allow modification or disruption of system files or configurations, potentially leading to denial of service or further exploitation. No known exploits are currently reported in the wild. The vulnerability is significant for environments where these touchscreen devices are used for critical control or automation functions, as unauthorized file access could compromise system stability or security policies.
Potential Impact
For European organizations, especially those in sectors like corporate offices, smart buildings, conference centers, and industrial automation where Crestron touchscreen devices are widely deployed, this vulnerability poses a risk of unauthorized system manipulation. Attackers exploiting this flaw could gain access to sensitive configuration files or system resources, potentially disrupting operations or enabling further attacks such as privilege escalation or lateral movement within the network. The impact is heightened in environments where these devices control physical access, environmental controls, or AV systems integral to business continuity. Given the medium severity and requirement for user interaction, the threat is more relevant in scenarios where attackers can trick users into interacting with malicious content or commands. The lack of fixes for discontinued firmware versions increases risk for organizations unable to upgrade, potentially exposing legacy systems to persistent threats.
Mitigation Recommendations
Organizations should prioritize upgrading affected Crestron touchscreen devices to firmware version 3.001.0031.001 or later where available. For devices running discontinued firmware without fixes, consider network segmentation to isolate these devices from critical infrastructure and limit exposure. Implement strict access controls and monitoring on management interfaces to detect unusual file access or configuration changes. Employ application-layer firewalls or intrusion detection systems to identify and block path traversal attack patterns targeting these devices. User training to recognize and avoid social engineering attempts that could trigger user interaction-based exploits is also recommended. Additionally, maintain an inventory of all Crestron devices and regularly audit firmware versions to ensure timely patching or replacement of vulnerable units. Where possible, disable unnecessary services or interfaces on the devices to reduce attack surface.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland
CVE-2025-47415: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in CRESTRON TOUCHSCREENS x60, x70 series
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CRESTRON TOUCHSCREENS x70 allows Relative Path Traversal.This issue affects TOUCHSCREENS x70: from 3.000.0110.001 before 3.001.0031.001. Confirmed Affected Hardware: TSW-760, TSW-1060 Confirmed Affected Firmware: 3.002.1061 - (no fix released, product discontinued) For x70 The Affected Firmware:- 3.000.0110.001 and versions below The Fixed Firmware:- 3.001.0031.001
AI-Powered Analysis
Technical Analysis
CVE-2025-47415 is a path traversal vulnerability classified under CWE-22 affecting Crestron Touchscreens x60 and x70 series devices, specifically confirmed on hardware models TSW-760 and TSW-1060. The vulnerability arises from improper limitation of pathname inputs, allowing an attacker to manipulate file paths to access directories and files outside the intended restricted directory scope. This can lead to unauthorized access to sensitive files or system resources. The affected firmware versions include 3.000.0110.001 and earlier, with a fixed version available at 3.001.0031.001 for the x70 series. However, some firmware such as 3.002.1061 remains vulnerable due to product discontinuation and lack of fixes. The CVSS 4.0 score is 6.8 (medium severity), indicating a network attack vector with low complexity, no privileges required but with high impact on integrity and availability, and requiring user interaction. The vulnerability does not affect confidentiality but can allow modification or disruption of system files or configurations, potentially leading to denial of service or further exploitation. No known exploits are currently reported in the wild. The vulnerability is significant for environments where these touchscreen devices are used for critical control or automation functions, as unauthorized file access could compromise system stability or security policies.
Potential Impact
For European organizations, especially those in sectors like corporate offices, smart buildings, conference centers, and industrial automation where Crestron touchscreen devices are widely deployed, this vulnerability poses a risk of unauthorized system manipulation. Attackers exploiting this flaw could gain access to sensitive configuration files or system resources, potentially disrupting operations or enabling further attacks such as privilege escalation or lateral movement within the network. The impact is heightened in environments where these devices control physical access, environmental controls, or AV systems integral to business continuity. Given the medium severity and requirement for user interaction, the threat is more relevant in scenarios where attackers can trick users into interacting with malicious content or commands. The lack of fixes for discontinued firmware versions increases risk for organizations unable to upgrade, potentially exposing legacy systems to persistent threats.
Mitigation Recommendations
Organizations should prioritize upgrading affected Crestron touchscreen devices to firmware version 3.001.0031.001 or later where available. For devices running discontinued firmware without fixes, consider network segmentation to isolate these devices from critical infrastructure and limit exposure. Implement strict access controls and monitoring on management interfaces to detect unusual file access or configuration changes. Employ application-layer firewalls or intrusion detection systems to identify and block path traversal attack patterns targeting these devices. User training to recognize and avoid social engineering attempts that could trigger user interaction-based exploits is also recommended. Additionally, maintain an inventory of all Crestron devices and regularly audit firmware versions to ensure timely patching or replacement of vulnerable units. Where possible, disable unnecessary services or interfaces on the devices to reduce attack surface.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Crestron
- Date Reserved
- 2025-05-06T19:36:18.439Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c07f368d6da9cee16f97e2
Added to database: 9/9/2025, 7:25:42 PM
Last enriched: 9/17/2025, 1:01:13 AM
Last updated: 2/7/2026, 3:06:45 AM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.