Description
International Data Casting (IDC) SFX2100 satellite receiver comes with the `/bin/date` utility installed with the setuid bit set. This configuration grants elevated privileges to any local user who can execute the binary. A local actor is able to use the GTFObins resource to preform privileged file reads as the root user on the local file system. This allows an actor to be able to read any root read-only files, such as the /etc/shadow file or other configuration/secrets carrier files.
Published: 2026-03-05
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Patch Now
AI Analysis

Impact

This vulnerability arises because the /bin/date binary on the International Datacasting SFX2100 satellite receiver is installed with its set‑uid bit set, allowing any local user to execute the command with root privileges. An attacker that can run /bin/date locally can leverage GTFObins techniques to perform privileged file reads, thereby accessing files that are normally only readable by root, such as /etc/shadow or other configuration files. The flaw constitutes a local privilege escalation and can be classified under CWE‑269, Incorrect Privilege Management.

Affected Systems

Affected systems are devices from International Datacasting Corporation, specifically the SFX2100 Satellite Receiver running firmware that retains the default set‑uid setting on /bin/date. Because the vulnerability is tied to the set‑uid permission, any SFX2100 installation that has not removed this setting is vulnerable; the advisory does not list a specific firmware version range, so all current deployments should be considered at risk.

Risk and Exploitability

The CVSS score of 8.3 reflects a high impact, and the EPSS score of less than 1 % indicates a low likelihood of widespread exploitation at present. However, the attack requires only local access— a common scenario on network‑connected receivers— and publicly available GTFObins scripts demonstrate how to read privileged files such as /etc/shadow. Because the flaw permits an arbitrary local user to gain root‑level file read capabilities, the risk to systems with sensitive configuration or credential files remains elevated. The vulnerability is not listed in CISA’s KEV catalog, but that does not diminish the need for immediate remediation.

Generated by OpenCVE AI on April 17, 2026 at 12:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest firmware from International Datacasting that removes or corrects the set‑uid configuration on /bin/date.
  • If a firmware update is not available, remove the set‑uid bit manually (chmod u-s /bin/date) or replace the binary with a vendor‑provided non‑setuid version.
  • Verify that sensitive files such as /etc/shadow are protected by correct ownership and file permissions, limiting read access to root only.

Generated by OpenCVE AI on April 17, 2026 at 12:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Datacast
Datacast sfx2100
Datacast sfx2100 Firmware
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:h:datacast:sfx2100:-:*:*:*:*:*:*:*
cpe:2.3:o:datacast:sfx2100_firmware:-:*:*:*:*:*:*:*
Vendors & Products Datacast
Datacast sfx2100
Datacast sfx2100 Firmware
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared International Datacasting Corporation
International Datacasting Corporation sfx2100 Satellite Receiver
Vendors & Products International Datacasting Corporation
International Datacasting Corporation sfx2100 Satellite Receiver

Thu, 05 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:30:00 +0000

Type Values Removed Values Added
References

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
References

Thu, 05 Mar 2026 01:30:00 +0000

Type Values Removed Values Added
Description International Data Casting (IDC) SFX2100 satellite receiver comes with the `/bin/date` utility installed with the setuid bit set. This configuration grants elevated privileges to any local user who can execute the binary. A local actor is able to use the GTFObins resource to preform privileged file reads as the root user on the local file system. This allows an actor to be able to read any root read-only files, such as the /etc/shadow file or other configuration/secrets carrier files.
Title `/bin/date` Binary given SETUID Permissions on IDC SFX2100 Leading to Potential LPE
Weaknesses CWE-269
References
Metrics cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:P'}


Subscriptions

Datacast Sfx2100 Sfx2100 Firmware
International Datacasting Corporation Sfx2100 Satellite Receiver
cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2026-03-05T16:41:24.667Z

Reserved: 2026-03-04T07:53:45.786Z

Link: CVE-2026-29122

cve-icon Vulnrichment

Updated: 2026-03-05T16:41:19.136Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T02:16:51.373

Modified: 2026-03-11T18:35:46.300

Link: CVE-2026-29122

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T13:00:12Z

Weaknesses