Impact
The vulnerability stems from the /root/anaconda-ks.cfg configuration file in IDC SFX2100 SuperFlex Satellite Receivers containing a hardcoded, weak root password hash. This insecure storage enables an attacker with local, low‑privileged access to perform offline dictionary attacks—most notably using the rockyou.txt wordlist—to derive the root password. Because direct SSH root login is disabled by default, the attacker must first acquire local access, perhaps through other vulnerabilities, and then use the recovered credentials to assume root privileges, thereby gaining full control over the device. This is a classic example of a CWE‑798 weakness where an insecurely stored password allows privilege escalation.
Affected Systems
International Datacasting Corporation SFX2100 SuperFlex Satellite Receiver is affected. The CVE description does not list specific firmware or hardware revisions, indicating that all current and potentially older firmware versions carrying the hardcoded password should be considered susceptible.
Risk and Exploitability
The CVSS score of 9.2 places this issue in the high severity range, reflecting its severe potential impact. The EPSS score is below 1 %, indicating that while the likelihood of exploitation is low, the impact if exploited is catastrophic. The vulnerability is not listed in CISA’s KEV catalog. Attackers need an initial local foothold—typically via other flaws or physical access—to leverage the hardcoded password for root escalation. The negative combination of a very low exploitation probability and a very high consequence scores it as a critical risk for any impacted deployments.
OpenCVE Enrichment