Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47415: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in CRESTRON TOUCHSCREENS x60, x70 series

0
Medium
VulnerabilityCVE-2025-47415cvecve-2025-47415cwe-22
Published: Tue Sep 09 2025 (09/09/2025, 19:20:35 UTC)
Source: CVE Database V5
Vendor/Project: CRESTRON
Product: TOUCHSCREENS x60, x70 series

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CRESTRON TOUCHSCREENS x70 allows Relative Path Traversal.This issue affects TOUCHSCREENS x70: from 3.000.0110.001 before 3.001.0031.001. Confirmed Affected Hardware: TSW-760, TSW-1060 Confirmed Affected Firmware: 3.002.1061 - (no fix released, product discontinued)   For x70   The Affected Firmware:- 3.000.0110.001  and versions below The Fixed Firmware:- 3.001.0031.001

AI-Powered Analysis

AILast updated: 09/17/2025, 01:01:13 UTC

Technical Analysis

CVE-2025-47415 is a path traversal vulnerability classified under CWE-22 affecting Crestron Touchscreens x60 and x70 series devices, specifically confirmed on hardware models TSW-760 and TSW-1060. The vulnerability arises from improper limitation of pathname inputs, allowing an attacker to manipulate file paths to access directories and files outside the intended restricted directory scope. This can lead to unauthorized access to sensitive files or system resources. The affected firmware versions include 3.000.0110.001 and earlier, with a fixed version available at 3.001.0031.001 for the x70 series. However, some firmware such as 3.002.1061 remains vulnerable due to product discontinuation and lack of fixes. The CVSS 4.0 score is 6.8 (medium severity), indicating a network attack vector with low complexity, no privileges required but with high impact on integrity and availability, and requiring user interaction. The vulnerability does not affect confidentiality but can allow modification or disruption of system files or configurations, potentially leading to denial of service or further exploitation. No known exploits are currently reported in the wild. The vulnerability is significant for environments where these touchscreen devices are used for critical control or automation functions, as unauthorized file access could compromise system stability or security policies.

Potential Impact

For European organizations, especially those in sectors like corporate offices, smart buildings, conference centers, and industrial automation where Crestron touchscreen devices are widely deployed, this vulnerability poses a risk of unauthorized system manipulation. Attackers exploiting this flaw could gain access to sensitive configuration files or system resources, potentially disrupting operations or enabling further attacks such as privilege escalation or lateral movement within the network. The impact is heightened in environments where these devices control physical access, environmental controls, or AV systems integral to business continuity. Given the medium severity and requirement for user interaction, the threat is more relevant in scenarios where attackers can trick users into interacting with malicious content or commands. The lack of fixes for discontinued firmware versions increases risk for organizations unable to upgrade, potentially exposing legacy systems to persistent threats.

Mitigation Recommendations

Organizations should prioritize upgrading affected Crestron touchscreen devices to firmware version 3.001.0031.001 or later where available. For devices running discontinued firmware without fixes, consider network segmentation to isolate these devices from critical infrastructure and limit exposure. Implement strict access controls and monitoring on management interfaces to detect unusual file access or configuration changes. Employ application-layer firewalls or intrusion detection systems to identify and block path traversal attack patterns targeting these devices. User training to recognize and avoid social engineering attempts that could trigger user interaction-based exploits is also recommended. Additionally, maintain an inventory of all Crestron devices and regularly audit firmware versions to ensure timely patching or replacement of vulnerable units. Where possible, disable unnecessary services or interfaces on the devices to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Crestron
Date Reserved
2025-05-06T19:36:18.439Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c07f368d6da9cee16f97e2

Added to database: 9/9/2025, 7:25:42 PM

Last enriched: 9/17/2025, 1:01:13 AM

Last updated: 10/30/2025, 4:13:04 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats