Vulnerability Description
Cobham Satcom Sailor 800 and 900 devices contained a vulnerability that allowed for arbitrary writing of content to the system's configuration file. This was exploitable via multiple attack vectors depending on the device's configuration. Further analysis also indicated this vulnerability could be leveraged to achieve a Denial of Service (DoS) condition, where the device would require a factory reset to return to normal operation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cobham | Satcom Sailor 800 Firmware | - |
| Cobham | Satcom Sailor 800 | - |
| Cobham | Satcom Sailor 900 Firmware | - |
| Cobham | Satcom Sailor 900 | - |
Related Weaknesses (CWE)
References
- https://cyberskr.com/blog/cobham-satcom-800-900.htmlThird Party Advisory
- https://gist.github.com/CyberSKR/1ade6d887039465d635e27fcbcc817a3Third Party Advisory
- https://cyberskr.com/blog/cobham-satcom-800-900.htmlThird Party Advisory
- https://gist.github.com/CyberSKR/1ade6d887039465d635e27fcbcc817a3Third Party Advisory
FAQ
What is CVE-2018-19393?
CVE-2018-19393 is a vulnerability with a CVSS score of 7.5 (HIGH). Cobham Satcom Sailor 800 and 900 devices contained a vulnerability that allowed for arbitrary writing of content to the system's configuration file. This was exploitable via multiple attack vectors de...
How severe is CVE-2018-19393?
CVE-2018-19393 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-19393?
Check the references section above for vendor advisories and patch information. Affected products include: Cobham Satcom Sailor 800 Firmware, Cobham Satcom Sailor 800, Cobham Satcom Sailor 900 Firmware, Cobham Satcom Sailor 900.