Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pr8m-pgmq-mj9q

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

** DISPUTED ** Cobham Sailor 6000 satellite terminals have hardcoded Tbus 2 credentials, which allows remote attackers to obtain access via a TBUS2 command. NOTE: the vendor reportedly states "there is no possibility to exploit another user's credentials."

** DISPUTED ** Cobham Sailor 6000 satellite terminals have hardcoded Tbus 2 credentials, which allows remote attackers to obtain access via a TBUS2 command. NOTE: the vendor reportedly states "there is no possibility to exploit another user's credentials."

EPSS

Процентиль: 81%
0.0155
Низкий

Связанные уязвимости

nvd
больше 11 лет назад

Cobham Sailor 6000 satellite terminals have hardcoded Tbus 2 credentials, which allows remote attackers to obtain access via a TBUS2 command. NOTE: the vendor reportedly states "there is no possibility to exploit another user's credentials.

EPSS

Процентиль: 81%
0.0155
Низкий