CVE-2018-19392

Cobham Satcom Sailor 250 and 500 devices before 1.25 contained an unauthenticated password reset vulnerability. This could allow modification of any user account's password (including the default "admin" account), without prior knowledge of their password. All that is required is knowledge of the username and attack vector (/index.lua?pageID=Administration usernameAdmChange, passwordAdmChange1, and passwordAdmChange2 fields).
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cobham:satcom_sailor_250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cobham:satcom_sailor_250:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cobham:satcom_sailor_500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cobham:satcom_sailor_500:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:57

Type Values Removed Values Added
References () https://cyberskr.com/blog/cobham-satcom-250-500.html - Exploit, Third Party Advisory () https://cyberskr.com/blog/cobham-satcom-250-500.html - Exploit, Third Party Advisory
References () https://gist.github.com/CyberSKR/2dfd5dccb20a209ec4d35b2678bac0d4 - Third Party Advisory () https://gist.github.com/CyberSKR/2dfd5dccb20a209ec4d35b2678bac0d4 - Third Party Advisory

Information

Published : 2019-03-15 16:29

Updated : 2024-11-21 03:57


NVD link : CVE-2018-19392

Mitre link : CVE-2018-19392

CVE.ORG link : CVE-2018-19392


JSON object : View

Products Affected

cobham

  • satcom_sailor_250_firmware
  • satcom_sailor_500
  • satcom_sailor_250
  • satcom_sailor_500_firmware
CWE
CWE-287

Improper Authentication