Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2018-19393
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-15 Mar, 2019 | 16:29
Updated At-03 Oct, 2019 | 00:03

Cobham Satcom Sailor 800 and 900 devices contained a vulnerability that allowed for arbitrary writing of content to the system's configuration file. This was exploitable via multiple attack vectors depending on the device's configuration. Further analysis also indicated this vulnerability could be leveraged to achieve a Denial of Service (DoS) condition, where the device would require a factory reset to return to normal operation.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.5HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
CPE Matches

cobham
cobham
>>satcom_sailor_800_firmware>>-
cpe:2.3:o:cobham:satcom_sailor_800_firmware:-:*:*:*:*:*:*:*
cobham
cobham
>>satcom_sailor_800>>-
cpe:2.3:h:cobham:satcom_sailor_800:-:*:*:*:*:*:*:*
cobham
cobham
>>satcom_sailor_900_firmware>>-
cpe:2.3:o:cobham:satcom_sailor_900_firmware:-:*:*:*:*:*:*:*
cobham
cobham
>>satcom_sailor_900>>-
cpe:2.3:h:cobham:satcom_sailor_900:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-732Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://cyberskr.com/blog/cobham-satcom-800-900.htmlcve@mitre.org
Third Party Advisory
https://gist.github.com/CyberSKR/1ade6d887039465d635e27fcbcc817a3cve@mitre.org
Third Party Advisory
Change History
0Changes found

Details not found