Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information about valid usernames by reading the loginName lines at the js/userLogin.js URI. NOTE: default passwords for the standard usernames are listed in the product's documentation: Dealer with password seatel3, SysAdmin with password seatel2, and User with password seatel1.
References
Link | Resource |
---|---|
http://misteralfa-hack.blogspot.cl/2018/01/seatelcobham-terminales-satelitales.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2018-01-07 19:29
Updated : 2018-02-01 10:23
NVD link : CVE-2018-5266
Mitre link : CVE-2018-5266
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
cobham
- sea_tel_121
- sea_tel_121_firmware