CRITICAL · 9.8

CVE-2018-19392

Cobham Satcom Sailor 250 and 500 devices before 1.25 contained an unauthenticated password reset vulnerability. This could allow modification of any user account's password (including the default "adm...

Vulnerability Description

Cobham Satcom Sailor 250 and 500 devices before 1.25 contained an unauthenticated password reset vulnerability. This could allow modification of any user account's password (including the default "admin" account), without prior knowledge of their password. All that is required is knowledge of the username and attack vector (/index.lua?pageID=Administration usernameAdmChange, passwordAdmChange1, and passwordAdmChange2 fields).

CVSS Score

9.8

CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
CobhamSatcom Sailor 250 Firmware< 1.25
CobhamSatcom Sailor 250-
CobhamSatcom Sailor 500 Firmware< 1.25
CobhamSatcom Sailor 500-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-19392?

CVE-2018-19392 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Cobham Satcom Sailor 250 and 500 devices before 1.25 contained an unauthenticated password reset vulnerability. This could allow modification of any user account's password (including the default "adm...

How severe is CVE-2018-19392?

CVE-2018-19392 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2018-19392?

Check the references section above for vendor advisories and patch information. Affected products include: Cobham Satcom Sailor 250 Firmware, Cobham Satcom Sailor 250, Cobham Satcom Sailor 500 Firmware, Cobham Satcom Sailor 500.