Researchers from CERT/CC discovered multiple vulnerabilities in Satcom terminal Cobham EXPLORER 710 that affects both firmware and device.
The vulnerabilities allow hackers to perform several attacks such as intercept the traffic, remotely execute the command, implant and hide a backdoor, DoS Attack, exfiltrate the sensitive data and more
Cobham EXPLORER 710 is a satellite telecommunication terminal, the device provides you internet access through satellite and various feature including the fastest on-demand video streaming via satellite.
The Terminal used in various sectors including space systems, Commercial aerospace, Maritime SATCOM, Land and Air defense for Military, Fighter jets and more.
EXPLORER 710 is also a highly sophisticated communication tool that provides IP streaming rates of 1 Mbps or even higher via an ethernet connection.
Cobham EXPLORER 710 provides communication interfaces including 2 x Ethernet, USB, WLAN 802.11 a/b/g, Digital I/O, Bluetooth and also the terminal is capable of providing Internet, Email, Phone, VoIP, FTP, FoIP (Fax), SMS Text, Video Streaming via satellite.
There are 6 severe vulnerabilities found in Cobham EXPLORER 710, and all the vulnerabilities affect the firmware version 1.07.
An authentication failure vulnerability resides in the web application portal let unauthenticated attackers gain the portal access and perform any changes to the device.
An unrestricted directory Access vulnerability found in webroot directory that contains no access restrictions and is allows local attackers to perform read, write and download any files from the Web root directory.
Another Authentication failure vulnerability found in Cobham EXPLORER 710 Satcom terminal web application portal allows attackers to perform unauthenticated access to port 5454 on the device.
” This could allow an unauthenticated, remote attacker to connect to this port via Telnet and execute 86 Attention (AT) commands, including some that provide unauthenticated, shell-like access to the device.”
A vulnerability found in web application portal that passing the login password in cleartext that allows a local attacker to intercept the traffic and gain complete control of the portal.
The device contains the root password that is the same for all versions of firmware up to and including v1.08.
By having the default root password, devices are highly vulnerable to attackers who could possibly reverse-engineer the password in all the available versions to gain complete unauthenticated device access.
Due to validation failure, the device does not validate its firmware image, and the Development scripts left in the firmware can be used to upload a custom firmware image that the device runs.
The vulnerability allows attackers to upload their own firmware image and intercept or modify traffic, spoof or intercept GPS traffic, exfiltrate private data, hide a backdoor, or cause a denial-of-service. CERT/CC researchers said.
Along with the above-mentioned flaws, researchers also discovered the missing of important security headers, which are highly dangerous for the device and it is vulnerable to cross-site scripting and clickjacking.
The CERT/CC said that they are currently unaware of a practical solution to these problems.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates
Hackers prefer phishing as it exploits human vulnerabilities rather than technical flaws which make it a highly effective and low-cost…
A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS)…
Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target…
ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts…
Santander has confirmed that there was a major data breach that affected its workers and customers in Spain, Uruguay, and…
The U.S. government has offered a prize of up to $5 million for information that leads to the arrest and…