Overview
CERT/CC researchers examined the satcom terminal Cobham EXPLORER 710 as an expansion of work from IOActive’s findings in 2014. They discovered multiple new vulnerabilities affecting the device and the firmware, some of which could allow an unauthenticated, local attacker to gain access to sensitive information or complete control of the device.
Description
The Cobham EXPLORER 710 is a portable satellite terminal used to provide satellite telecommunications and internet access. For consistency, “device” mentioned in the following section is defined as the Cobham EXPLORER 710. The affected firmware version is 1.07 for all of the vulnerabilities listed below unless otherwise noted. CVE-2019-9529 |
Impact
The impacts of these vulnerabilities are that an unauthenticated, local attacker could intercept traffic that may include passwords or sensitive data, remotely execute commands on the device, access files that should be restricted, and make changes to the device that could include uploading custom firmware for control over it. |
Solution
The CERT/CC is currently unaware of a practical solution to these problems. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6.9 | AV:L/AC:M/Au:N/C:C/I:C/A:C |
Temporal | 6.9 | E:ND/RL:ND/RC:ND |
Environmental | 6.9 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
This document was written by Kyle O'Meara and David Belasco of the CERT Coordination Center of the Carnegie Mellon Software Engineering Institute.
Other Information
CVE IDs: | CVE-2019-9529 , CVE-2019-9530, CVE-2019-9531, CVE-2019-9532, CVE-2019-9533, CVE-2019-9534 |
Date Public: | 2019-10-09 |
Date First Published: | 2019-10-09 |
Date Last Updated: | 2019-10-11 16:25 UTC |
Document Revision: | 46 |