Vulnerability Note VU#602006
Cobham SATCOM products' web interface contains a weak password recovery vulnerability
CWE-640: Weak Password Recovery Mechanism for Forgotten Password
IOActive has reported that Cobham SAILOR 900 VSAT, SAILOR FleetBroadBand 150/250/500, EXPLORER BGAN, and AVIATOR 200/300/350/700D have been identified with a weak password recovery mechanism. It is possible more products than what have been identified are affected. The password reset algorithm used by these products can be reverse engineered so an attacker may be able to generate their own reset codes to change the password of the administrator account.
A remote unauthenticated attacker with access to the web interface may be able to reset the administrator password and take over the account.
We are currently unaware of a practical solution to this problem. Please consider the following workaround.
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Cobham plc||Affected||14 Jan 2014||28 Jan 2014|
CVSS Metrics (Learn More)
Thanks to Ruben Santamarta for reporting this vulnerability.
This document was written by Chris King.
- CVE IDs: CVE-2013-7180
- Date Public: 07 Aug 2014
- Date First Published: 07 Aug 2014
- Date Last Updated: 07 Aug 2014
- Document Revision: 27
If you have feedback, comments, or additional information about this vulnerability, please send us email.