Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, is vulnerable to an authentication bypass using an alternate path or channel. By default, port 1953 is accessible via telnet and does not require authentication. An unauthenticated remote user can access many administrative commands via this interface, including rebooting the modem.
References
Link | Resource |
---|---|
https://www.kb.cert.org/vuls/id/614751 | Third Party Advisory US Government Resource |
https://www.securityfocus.com/bid/96244 | Third Party Advisory VDB Entry |
https://www.kb.cert.org/vuls/id/614751 | Third Party Advisory US Government Resource |
https://www.securityfocus.com/bid/96244 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 03:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.kb.cert.org/vuls/id/614751 - Third Party Advisory, US Government Resource | |
References | () https://www.securityfocus.com/bid/96244 - Third Party Advisory, VDB Entry |
Information
Published : 2018-07-13 20:29
Updated : 2024-11-21 03:01
NVD link : CVE-2016-9497
Mitre link : CVE-2016-9497
CVE.ORG link : CVE-2016-9497
JSON object : View
Products Affected
hughes
- hn7740s
- hn7000sm_firmware
- hn7000sm
- dw7000_firmware
- hn7000s_firmware
- hn7000s
- dw7000
- hn7740s_firmware