Description
Cobham Satcom Sailor 800 and 900 devices contained a vulnerability that allowed for arbitrary writing of content to the system's configuration file. This was exploitable via multiple attack vectors depending on the device's configuration. Further analysis also indicated this vulnerability could be leveraged to achieve a Denial of Service (DoS) condition, where the device would require a factory reset to return to normal operation.
References (2)
Core 2
Core References
Third Party Advisory x_refsource_misc
https://gist.github.com/CyberSKR/1ade6d887039465d635e27fcbcc817a3
Third Party Advisory x_refsource_misc
https://cyberskr.com/blog/cobham-satcom-800-900.html
Scores
CVSS v3
7.5
EPSS
0.0040
EPSS Percentile
60.4%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-732
Status
published
Products (2)
cobham/satcom_sailor_800_firmware
cobham/satcom_sailor_900_firmware
Published
Mar 15, 2019
Tracked Since
Feb 18, 2026