Cobham Sailor 6000 satellite terminals have hardcoded Tbus 2 credentials, which allows remote attackers to obtain access via a TBUS2 command. NOTE: the vendor reportedly states "there is no possibility to exploit another user's credentials.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/269991 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/269991 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/269991 - Third Party Advisory, US Government Resource |
07 Nov 2023, 02:19
Type | Values Removed | Values Added |
---|---|---|
Summary | Cobham Sailor 6000 satellite terminals have hardcoded Tbus 2 credentials, which allows remote attackers to obtain access via a TBUS2 command. NOTE: the vendor reportedly states "there is no possibility to exploit another user's credentials. |
Information
Published : 2014-08-15 11:15
Updated : 2024-11-21 02:07
NVD link : CVE-2014-2941
Mitre link : CVE-2014-2941
CVE.ORG link : CVE-2014-2941
JSON object : View
Products Affected
cobham
- sailor_6300_mf_\/_hf
- ailor_6110_mini-c_gmdss
- sailor_6006_message_terminal
- sailor_6222_vhf
CWE