Skip to main content

CVE-2025-47416: CWE-697 Incorrect Comparison in CRESTRON TOUCHSCREEN x70

Medium
VulnerabilityCVE-2025-47416cvecve-2025-47416cwe-697
Published: Tue Sep 09 2025 (09/09/2025, 13:52:45 UTC)
Source: CVE Database V5
Vendor/Project: CRESTRON
Product: TOUCHSCREEN x70

Description

A vulnerability exists in the ConsoleFindCommandMatchList function in libsymproc. so imported by ctpd that may lead to unauthorized execution of an attacker-defined file that gets prioritized by the ConsoleFindCommandMatchList. A third-party researcher discovered that the ConsoleFindCommandMatchList enumerates the /dev/shm/symproc/c directory in alphabetical order to identify console commands. Permission levels are inferred from the integer values present in each command's file name.  Confirmed Affected Hardware: TSW-760, TSW-1060 Confirmed Affected Firmware: 3.002.1061  Fixed Firmware: no fixed released (product is discontinued and end of life)   For x70   The Affected Firmware:- 3.000.0110.001  and versions below The Fixed Firmware:- 3.001.0031.001

AI-Powered Analysis

AILast updated: 09/09/2025, 14:00:21 UTC

Technical Analysis

CVE-2025-47416 is a medium-severity vulnerability identified in the CRESTRON TOUCHSCREEN x70 series, specifically affecting hardware models TSW-760 and TSW-1060. The flaw resides in the ConsoleFindCommandMatchList function within the libsymproc library, which is imported by the ctpd process. This function enumerates files in the /dev/shm/symproc/c directory in alphabetical order to identify console commands, inferring permission levels from integer values in the filenames. Due to an incorrect comparison logic (CWE-697), an attacker can manipulate the ordering or naming of files to prioritize execution of a malicious, attacker-defined file. This could lead to unauthorized execution of arbitrary code with elevated privileges. The vulnerability affects firmware versions 3.002.1061 and earlier on TSW-760 and TSW-1060, and for the x70 series, firmware versions 3.000.0110.001 and below. Notably, no fixed firmware is available for the discontinued TSW-760 and TSW-1060 models, while a fixed firmware version 3.001.0031.001 exists for the x70 series. The CVSS v4.0 score is 5.9 (medium), reflecting network attack vector with high attack complexity and requiring high privileges but no user interaction. No known exploits are currently in the wild. The vulnerability could allow an attacker with existing high privileges to escalate their control by executing arbitrary files, potentially compromising device integrity and availability within environments using these CRESTRON touchscreen controllers.

Potential Impact

For European organizations, the impact of this vulnerability is significant in environments relying on CRESTRON touchscreen controllers for building automation, conference room management, and AV control systems. Unauthorized code execution could disrupt critical facility operations, cause denial of service, or enable lateral movement within corporate networks. Given that these devices often integrate with enterprise IT and operational technology (OT) systems, exploitation could lead to broader network compromise or data integrity issues. The lack of firmware updates for discontinued models increases risk for organizations still operating legacy hardware. Disruption or compromise of these devices could affect sectors such as corporate offices, educational institutions, government buildings, and conference centers across Europe, potentially impacting business continuity and operational security.

Mitigation Recommendations

Organizations should first inventory their CRESTRON touchscreen devices to identify affected models and firmware versions. For devices with available fixed firmware (x70 series), immediate firmware upgrade to version 3.001.0031.001 or later is recommended. For discontinued models (TSW-760, TSW-1060) without patches, organizations should consider device replacement or isolating these devices on segmented networks with strict access controls to limit exposure. Additionally, restrict administrative access to these devices to trusted personnel only, enforce strong authentication mechanisms, and monitor device logs for suspicious activity. Network-level protections such as firewall rules to limit access to device management ports and intrusion detection systems tuned for anomalous behavior can further reduce risk. Finally, coordinate with CRESTRON support or authorized vendors for guidance on secure configurations and potential compensating controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Crestron
Date Reserved
2025-05-06T19:36:18.440Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c032e6d1b33bcea25a9a3b

Added to database: 9/9/2025, 2:00:06 PM

Last enriched: 9/9/2025, 2:00:21 PM

Last updated: 9/9/2025, 2:18:10 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats