Description
Hard-coded credentials in AmosConnect 8 allow remote attackers to gain full administrative privileges, including the ability to execute commands on the Microsoft Windows host platform with SYSTEM privileges by abusing AmosConnect Task Manager.
Published: 2017-07-22
Score: 9.8 Critical
EPSS: 6.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2017-12343 Hard-coded credentials in AmosConnect 8 allow remote attackers to gain full administrative privileges, including the ability to execute commands on the Microsoft Windows host platform with SYSTEM privileges by abusing AmosConnect Task Manager.
History

No history.

Subscriptions

Inmarsat Amosconnect
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-05T14:16:28.507Z

Reserved: 2016-12-05T00:00:00.000Z

Link: CVE-2017-3222

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-07-22T20:29:00.250

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-3222

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses