CVE-2017-3222

Hard-coded credentials in AmosConnect 8 allow remote attackers to gain full administrative privileges, including the ability to execute commands on the Microsoft Windows host platform with SYSTEM privileges by abusing AmosConnect Task Manager.
References
Link Resource
http://www.inmarsat.com/news/inmarsat-response-to-ioactive-claims/ Vendor Advisory
http://www.securityfocus.com/bid/99899 Third Party Advisory VDB Entry
https://twitter.com/mkolsek/status/923988845783322625 Third Party Advisory
https://www.kb.cert.org/vuls/id/586501 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:inmarsat:amosconnect:8.0:*:*:*:*:*:*:*
cpe:2.3:a:inmarsat:amosconnect:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:inmarsat:amosconnect:8.0.2:*:*:*:*:*:*:*
cpe:2.3:a:inmarsat:amosconnect:8.2.0:*:*:*:*:*:*:*
cpe:2.3:a:inmarsat:amosconnect:8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:inmarsat:amosconnect:8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:inmarsat:amosconnect:8.3.0:*:*:*:*:*:*:*
cpe:2.3:a:inmarsat:amosconnect:8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:inmarsat:amosconnect:8.4.0:*:*:*:*:*:*:*
cpe:2.3:a:inmarsat:amosconnect:8.4.0.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-07-22 20:29

Updated : 2024-02-28 16:04


NVD link : CVE-2017-3222

Mitre link : CVE-2017-3222

CVE.ORG link : CVE-2017-3222


JSON object : View

Products Affected

inmarsat

  • amosconnect
CWE
CWE-798

Use of Hard-coded Credentials