Skip to content

Instantly share code, notes, and snippets.

@CyberSKR
Last active March 15, 2019 11:38
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save CyberSKR/2dfd5dccb20a209ec4d35b2678bac0d4 to your computer and use it in GitHub Desktop.
Save CyberSKR/2dfd5dccb20a209ec4d35b2678bac0d4 to your computer and use it in GitHub Desktop.
CVE-2018-19392: The Cobham Satcom Sailor 250 and Sailor 500 devices contained an unauthenticated password reset vulnerability. This could allow them to modify any user account's password (including the default "admin" account), without prior knowledge of their password. All that is required is knowledge of the username and attack vector.

CVE-2018-19392

Suggested description
The Cobham Satcom Sailor 250 and Sailor 500 devices contained an unauthenticated password reset vulnerability. This could allow them to modify any user account's password (including the default "admin" account), without prior knowledge of their password. All that is required is knowledge of the username and attack vector.


Vulnerability Type
Incorrect Access Control


Vendor of Product
Cobham Satcom


Affected Product Code Base
Sailor 250 - <1.25
Sailor 500 - <1.25


Reference
https://gist.github.com/CyberSKR/2dfd5dccb20a209ec4d35b2678bac0d4
https://cyberskr.com/blog/cobham-satcom-250-500.html

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment