Description
The /root/anaconda-ks.cfg installation configuration file in International Datacasting Corporation (IDC) SFX Series(SFX2100) SuperFlex Satellite Receiver insecurely stores the hardcoded root password hash. The password itself is highly insecure and susceptible to offline dictionary attacks using the rockyou.txt wordlist. Because direct root SSH login is disabled, an attacker must first obtain low-privileged access to the system (e.g., via other vulnerabilities) to be able to log in as the root user. The password is hardcoded and so allows for an actor with local access on effected versions to escalate to root
Published: 2026-03-04
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation via Hardcoded Root Password
Action: Apply Patch
AI Analysis

Impact

The vulnerability stems from the /root/anaconda-ks.cfg configuration file in IDC SFX2100 SuperFlex Satellite Receivers containing a hardcoded, weak root password hash. This insecure storage enables an attacker with local, low‑privileged access to perform offline dictionary attacks—most notably using the rockyou.txt wordlist—to derive the root password. Because direct SSH root login is disabled by default, the attacker must first acquire local access, perhaps through other vulnerabilities, and then use the recovered credentials to assume root privileges, thereby gaining full control over the device. This is a classic example of a CWE‑798 weakness where an insecurely stored password allows privilege escalation.

Affected Systems

International Datacasting Corporation SFX2100 SuperFlex Satellite Receiver is affected. The CVE description does not list specific firmware or hardware revisions, indicating that all current and potentially older firmware versions carrying the hardcoded password should be considered susceptible.

Risk and Exploitability

The CVSS score of 9.2 places this issue in the high severity range, reflecting its severe potential impact. The EPSS score is below 1 %, indicating that while the likelihood of exploitation is low, the impact if exploited is catastrophic. The vulnerability is not listed in CISA’s KEV catalog. Attackers need an initial local foothold—typically via other flaws or physical access—to leverage the hardcoded password for root escalation. The negative combination of a very low exploitation probability and a very high consequence scores it as a critical risk for any impacted deployments.

Generated by OpenCVE AI on April 16, 2026 at 13:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest IDC firmware or configuration update that removes the hardcoded root password from the anaconda-ks.cfg file.
  • If a vendor update is unavailable, immediately delete or rename the anaconda-ks.cfg file and set a strong, unique password for the root account to prevent reuse.
  • Enforce strict physical and network access controls—restrict console port use, segment the device from untrusted networks, and monitor for unauthorized local access attempts.

Generated by OpenCVE AI on April 16, 2026 at 13:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Datacast
Datacast sfx2100
Datacast sfx2100 Firmware
CPEs cpe:2.3:h:datacast:sfx2100:-:*:*:*:*:*:*:*
cpe:2.3:o:datacast:sfx2100_firmware:-:*:*:*:*:*:*:*
Vendors & Products Datacast
Datacast sfx2100
Datacast sfx2100 Firmware
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 05 Mar 2026 06:30:00 +0000

Type Values Removed Values Added
References

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
References

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared International Datacasting Corporation
International Datacasting Corporation idc Sfx2100 Superflex Satellite Receiver
Vendors & Products International Datacasting Corporation
International Datacasting Corporation idc Sfx2100 Superflex Satellite Receiver

Wed, 04 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
Description The /root/anaconda-ks.cfg installation configuration file in International Datacasting Corporation (IDC) SFX Series(SFX2100) SuperFlex Satellite Receiver insecurely stores the hardcoded root password hash. The password itself is highly insecure and susceptible to offline dictionary attacks using the rockyou.txt wordlist. Because direct root SSH login is disabled, an attacker must first obtain low-privileged access to the system (e.g., via other vulnerabilities) to be able to log in as the root user. The password is hardcoded and so allows for an actor with local access on effected versions to escalate to root
Title Insecure, Hardcoded Root Password Stored in Anaconda Configuration File On IDC SFX2100 Satellite Receiver
Weaknesses CWE-798
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N'}


Subscriptions

Datacast Sfx2100 Sfx2100 Firmware
International Datacasting Corporation Idc Sfx2100 Superflex Satellite Receiver
cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2026-03-05T05:56:21.420Z

Reserved: 2026-03-04T07:53:45.786Z

Link: CVE-2026-29120

cve-icon Vulnrichment

Updated: 2026-03-04T14:43:34.527Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T08:16:14.587

Modified: 2026-03-17T17:08:34.183

Link: CVE-2026-29120

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:45:21Z

Weaknesses