Show filters
21 Total Results
Displaying 11-20 of 21
Sort by:
Attacker Value
Unknown
CVE-2018-19394
Disclosure Date: March 15, 2019 (last updated November 27, 2024)
Cobham Satcom Sailor 800 and 900 devices contained persistent XSS, which required administrative access to exploit. The vulnerability was exploitable by acquiring a copy of the device's configuration file, inserting an XSS payload into a relevant field (e.g., Satellite name), and then restoring the malicious configuration file.
0
Attacker Value
Unknown
CVE-2018-5728
Disclosure Date: January 16, 2018 (last updated November 26, 2024)
Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information via a /cgi-bin/getSysStatus request, as demonstrated by the Latitude/Longitude of the ship, or satellite details.
0
Attacker Value
Unknown
CVE-2018-5267
Disclosure Date: January 08, 2018 (last updated November 26, 2024)
Cobham Sea Tel 121 build 222701 devices allow remote attackers to bypass authentication via a direct request to MenuDealerGx.html, MenuDealer.html, MenuEuNCGx.html, MenuEuNC.html, MenuSysGx.html, or MenuSys.html.
0
Attacker Value
Unknown
CVE-2018-5266
Disclosure Date: January 08, 2018 (last updated November 26, 2024)
Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information about valid usernames by reading the loginName lines at the js/userLogin.js URI. NOTE: default passwords for the standard usernames are listed in the product's documentation: Dealer with password seatel3, SysAdmin with password seatel2, and User with password seatel1.
0
Attacker Value
Unknown
CVE-2018-5071
Disclosure Date: January 08, 2018 (last updated November 26, 2024)
Persistent XSS exists in the web server on Cobham Sea Tel 116 build 222429 satellite communication system devices: remote attackers can inject malicious JavaScript code using the device's TELNET shell built-in commands, as demonstrated by the "set ship name" command. This is similar to a Cross Protocol Injection with SNMP.
0
Attacker Value
Unknown
CVE-2014-2942
Disclosure Date: September 22, 2014 (last updated October 05, 2023)
Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code.
0
Attacker Value
Unknown
CVE-2014-2964
Disclosure Date: August 15, 2014 (last updated October 05, 2023)
Cobham Aviator 700D and 700E satellite terminals have hardcoded passwords for the (1) debug, (2) prod, (3) do160, and (4) flrp programs, which allows physically proximate attackers to gain privileges by sending a password over a serial line.
0
Attacker Value
Unknown
CVE-2014-2940
Disclosure Date: August 15, 2014 (last updated October 05, 2023)
Cobham Sailor 900 and 6000 satellite terminals with firmware 1.08 MFHF and 2.11 VHF have hardcoded credentials for the administrator account, which allows attackers to obtain administrative control by leveraging physical access or terminal access.
0
Attacker Value
Unknown
CVE-2014-2941
Disclosure Date: August 15, 2014 (last updated November 08, 2023)
Cobham Sailor 6000 satellite terminals have hardcoded Tbus 2 credentials, which allows remote attackers to obtain access via a TBUS2 command. NOTE: the vendor reportedly states "there is no possibility to exploit another user's credentials.
0
Attacker Value
Unknown
CVE-2014-0328
Disclosure Date: August 15, 2014 (last updated October 05, 2023)
The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows attackers to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response.
0