This vulnerability is a protocol level vulnerability and as such affects nearly all correct implementations of the firmware.
The following devices are affected:
- TSR-302 - Resolved in Version 1.004.0007
- TST-602 - Resolved in Version 1.004.0007
- TST-902 - Resolved in Version 1.004.0007
Other Crestron WiFi products do not support WPA2 and as such are not affected.
If any of the CEN-WAP products are used with non-Crestron products, all unencrypted information should be considered at risk. Use HTTPS and other secure protocols until a fix is available.
Most traffic between the TSR-302, TST-602, TST-902 and the control system is over Crestron Extended Range 2.4 GHz RF (ER) and is thus unaffected. However, WiFi communications are used for some additional functions (such as video playback, intercom, etc.) and could be vulnerable. Crestron is actively working towards a fix.
If you are using a non-Crestron WAP you should also check with the vendor for updates.
A notable risk is that the following UI Applications use direct connections and could be intercepted and potentially spoofed:
- Media Player Object
- All Pyng Objects
- TV Presets Object
Two possible mitigations exist:
- Remove the UI Applications from devices.
- Disable WiFi on the Remotes. This will allow the UI Applications to still run but will disable other features (such as streaming video, intercom, graphics). Note that performance of the applications will also be affected.
It is recommended that all installations follow the Secure Deployment Guide found in Online Help ID 5571. This will enable additional encryption on the device. This will not remove the risk noted regarding the UI Applications by itself.