Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information about valid usernames by reading the loginName lines at the js/userLogin.js URI. NOTE: default passwords for the standard usernames are listed in the product's documentation: Dealer with password seatel3, SysAdmin with password seatel2, and User with password seatel1.
References
Link | Resource |
---|---|
http://misteralfa-hack.blogspot.cl/2018/01/seatelcobham-terminales-satelitales.html | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-01-08T03:00:00
Updated: 2018-01-08T03:57:01
Reserved: 2018-01-07T00:00:00
Link: CVE-2018-5266
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-01-08T03:29:00.280
Modified: 2018-02-01T18:23:25.810
Link: CVE-2018-5266
JSON object: View
Redhat Information
No data.
CWE