Description
Cobham Satcom Sailor 250 and 500 devices before 1.25 contained an unauthenticated password reset vulnerability. This could allow modification of any user account's password (including the default "admin" account), without prior knowledge of their password. All that is required is knowledge of the username and attack vector (/index.lua?pageID=Administration usernameAdmChange, passwordAdmChange1, and passwordAdmChange2 fields).
Published: 2019-03-15
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-11085 Cobham Satcom Sailor 250 and 500 devices before 1.25 contained an unauthenticated password reset vulnerability. This could allow modification of any user account's password (including the default "admin" account), without prior knowledge of their password. All that is required is knowledge of the username and attack vector (/index.lua?pageID=Administration usernameAdmChange, passwordAdmChange1, and passwordAdmChange2 fields).
History

No history.

Subscriptions

Cobham Satcom Sailor 250 Satcom Sailor 250 Firmware Satcom Sailor 500 Satcom Sailor 500 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:37:11.384Z

Reserved: 2018-11-20T00:00:00.000Z

Link: CVE-2018-19392

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-15T16:29:00.327

Modified: 2024-11-21T03:57:50.770

Link: CVE-2018-19392

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses