Skip to main content

CVE-2025-47421: CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in CRESTRON TOUCHSCREENS x70

High
VulnerabilityCVE-2025-47421cvecve-2025-47421cwe-88
Published: Wed Sep 03 2025 (09/03/2025, 13:49:40 UTC)
Source: CVE Database V5
Vendor/Project: CRESTRON
Product: TOUCHSCREENS x70

Description

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in CRESTRON TOUCHSCREENS x70 allows Argument Injection.This issue affects TOUCHSCREENS x70: from 3.001.0031.001 through 3.001.0034.001. A specially crafted SCP command sent via SSH login string can lead a valid administrator user to gain Privileged Operating System access on the device. Following Products Models are affected: TSW-x70 TSW-x60 TST-1080 AM-3000/3100/3200 Soundbar VB70 HD-PS622/621/402 HD-TXU-RXU-4kZ-211 HD-MDNXM-4KZ-E *Note: additional firmware updates will be published once made available

AI-Powered Analysis

AILast updated: 09/03/2025, 14:17:57 UTC

Technical Analysis

CVE-2025-47421 is a high-severity vulnerability classified under CWE-88, which pertains to improper neutralization of argument delimiters in a command, commonly known as argument injection. This vulnerability affects multiple Crestron products, primarily the TOUCHSCREENS x70 series (versions from 3.001.0031.001 through 3.001.0034.001), as well as other related devices including TSW-x60, TST-1080, AM-3000/3100/3200 series, Soundbar VB70, and various HD transmission and matrix switcher units. The core issue arises from the way these devices handle SCP commands sent via the SSH login string. Specifically, a specially crafted SCP command can exploit the improper sanitization of argument delimiters, allowing an authenticated administrator user to escalate privileges to gain full operating system-level access on the device. This means that once an attacker has valid administrator credentials, they can execute arbitrary commands at the OS level, potentially compromising the device's integrity and confidentiality. The vulnerability does not require user interaction beyond authentication, and no known exploits are currently reported in the wild. The CVSS 4.0 base score is 8.6, reflecting the network attack vector, low attack complexity, no required privileges beyond administrator level, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability affects critical control and AV infrastructure devices commonly used in enterprise, commercial, and government environments for building automation and audiovisual management.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Crestron devices for building automation, conference room management, and AV control systems. Successful exploitation could allow attackers with administrator credentials to gain full OS-level control, enabling them to manipulate device functionality, disrupt services, exfiltrate sensitive configuration data, or pivot to other internal systems. This could lead to operational downtime, loss of confidentiality of sensitive meeting content or building control data, and potential safety risks if integrated with physical security or environmental controls. Given the widespread use of Crestron products in corporate offices, government buildings, and educational institutions across Europe, the vulnerability poses a risk to critical infrastructure and business continuity. Additionally, the lack of known public exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing the issue before exploitation attempts emerge.

Mitigation Recommendations

Organizations should immediately identify and inventory all affected Crestron devices, focusing on TOUCHSCREENS x70 and the other listed models. Since no patches are currently available, implement compensating controls such as restricting SSH access to trusted management networks and enforcing strong authentication mechanisms for administrator accounts, including multi-factor authentication where possible. Monitor SSH login attempts and command execution logs for unusual or suspicious activity indicative of argument injection attempts. Network segmentation should be employed to isolate these devices from general user networks and limit exposure. Additionally, coordinate with Crestron for timely firmware updates and apply them as soon as they are released. Consider disabling SCP or SSH access if not required for device management. Finally, conduct regular security assessments and penetration tests focusing on these devices to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Crestron
Date Reserved
2025-05-06T19:36:18.441Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b84a86ad5a09ad00f67896

Added to database: 9/3/2025, 2:02:46 PM

Last enriched: 9/3/2025, 2:17:57 PM

Last updated: 9/4/2025, 6:10:14 PM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats