Cobham Satcom Sailor 800 and 900 devices contained a vulnerability that allowed for arbitrary writing of content to the system's configuration file. This was exploitable via multiple attack vectors depending on the device's configuration. Further analysis also indicated this vulnerability could be leveraged to achieve a Denial of Service (DoS) condition, where the device would require a factory reset to return to normal operation.
References
Link | Resource |
---|---|
https://cyberskr.com/blog/cobham-satcom-800-900.html | Third Party Advisory |
https://gist.github.com/CyberSKR/1ade6d887039465d635e27fcbcc817a3 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-03-15T16:00:00
Updated: 2019-03-15T15:57:01
Reserved: 2018-11-20T00:00:00
Link: CVE-2018-19393
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-03-15T16:29:00.403
Modified: 2019-10-03T00:03:26.223
Link: CVE-2018-19393
JSON object: View
Redhat Information
No data.
CWE