Cobham Satcom Sailor 800 and 900 devices contained a vulnerability that allowed for arbitrary writing of content to the system's configuration file. This was exploitable via multiple attack vectors depending on the device's configuration. Further analysis also indicated this vulnerability could be leveraged to achieve a Denial of Service (DoS) condition, where the device would require a factory reset to return to normal operation.

Project Subscriptions

Vendors Products
Satcom Sailor 800 Subscribe
Satcom Sailor 800 Firmware Subscribe
Satcom Sailor 900 Subscribe
Satcom Sailor 900 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2018-11086 Cobham Satcom Sailor 800 and 900 devices contained a vulnerability that allowed for arbitrary writing of content to the system's configuration file. This was exploitable via multiple attack vectors depending on the device's configuration. Further analysis also indicated this vulnerability could be leveraged to achieve a Denial of Service (DoS) condition, where the device would require a factory reset to return to normal operation.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:37:10.744Z

Reserved: 2018-11-20T00:00:00.000Z

Link: CVE-2018-19393

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-15T16:29:00.403

Modified: 2024-11-21T03:57:50.930

Link: CVE-2018-19393

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses