CVE-2018-5266
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information about valid usernames by reading the loginName lines at the js/userLogin.js URI. NOTE: default passwords for the standard usernames are listed in the product's documentation: Dealer with password seatel3, SysAdmin with password seatel2, and User with password seatel1.
Los dispositivos Cobham Sea Tel 121 build 222701 permiten que los atacantes remotos obtengan información potencialmente sensible sobre nombres de usuario válidos leyendo las líneas loginName en la URI js/userLogin.js. NOTA: las contraseñas por defecto para los nombres de usuario estándar están listadas en la documentación del producto. Dealer con contraseña seatel3, SysAdmin con contraseña seatel2, y User con contraseña seatel1.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-01-07 CVE Reserved
- 2018-01-08 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
http://misteralfa-hack.blogspot.cl/2018/01/seatelcobham-terminales-satelitales.html | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cobham Search vendor "Cobham" | Sea Tel 121 Firmware Search vendor "Cobham" for product "Sea Tel 121 Firmware" | 222701 Search vendor "Cobham" for product "Sea Tel 121 Firmware" and version "222701" | - |
Affected
| in | Cobham Search vendor "Cobham" | Sea Tel 121 Search vendor "Cobham" for product "Sea Tel 121" | - | - |
Safe
|