Cobham Satcom Sailor 800 and 900 devices contained a vulnerability that allowed for arbitrary writing of content to the system's configuration file. This was exploitable via multiple attack vectors depending on the device's configuration. Further analysis also indicated this vulnerability could be leveraged to achieve a Denial of Service (DoS) condition, where the device would require a factory reset to return to normal operation.
References
Link | Resource |
---|---|
https://cyberskr.com/blog/cobham-satcom-800-900.html | Third Party Advisory |
https://gist.github.com/CyberSKR/1ade6d887039465d635e27fcbcc817a3 | Third Party Advisory |
https://cyberskr.com/blog/cobham-satcom-800-900.html | Third Party Advisory |
https://gist.github.com/CyberSKR/1ade6d887039465d635e27fcbcc817a3 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://cyberskr.com/blog/cobham-satcom-800-900.html - Third Party Advisory | |
References | () https://gist.github.com/CyberSKR/1ade6d887039465d635e27fcbcc817a3 - Third Party Advisory |
Information
Published : 2019-03-15 16:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19393
Mitre link : CVE-2018-19393
CVE.ORG link : CVE-2018-19393
JSON object : View
Products Affected
cobham
- satcom_sailor_800_firmware
- satcom_sailor_900
- satcom_sailor_800
- satcom_sailor_900_firmware
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource