CVE-2019-9533

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to gain root access to Cobham EXPLORER 710 satellite terminals by exploiting a static root password shared across all devices up to firmware v1.08. It affects users of these devices with firmware versions up to and including v1.08, enabling unauthorized control over critical communication hardware.

💻 Affected Systems

Products:
  • Cobham EXPLORER 710
Versions: All firmware versions up to and including v1.08
Operating Systems: Embedded OS on the device
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is inherent due to a hardcoded root password; no specific configuration changes are required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could take full control of the device, intercept or manipulate satellite communications, disrupt operations, or use it as a foothold into connected networks.

🟠

Likely Case

Attackers with physical or network access could log in as root, modify configurations, steal data, or disable the device, impacting maritime, aviation, or remote operations.

🟢

If Mitigated

If patched or isolated, the risk is minimal, but unpatched devices remain highly vulnerable to targeted attacks.

🌐 Internet-Facing: HIGH, as devices exposed to the internet can be directly targeted by attackers to gain authenticated access.
🏢 Internal Only: HIGH, as internal attackers or compromised systems could exploit this to escalate privileges and compromise network integrity.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of the static password, which can be reverse-engineered from firmware images; no authentication bypass is needed once the password is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware versions after v1.08

Vendor Advisory: https://kb.cert.org/vuls/id/719689/

Restart Required: Yes

Instructions:

1. Download the latest firmware from Cobham's official support site. 2. Follow the vendor's update instructions for the EXPLORER 710. 3. Reboot the device after installation to apply the patch.

🔧 Temporary Workarounds

Change Root Password

all

Manually change the root password on the device to a strong, unique value if firmware update is not immediately possible.

Login as root and use the 'passwd' command to set a new password.

Network Isolation

all

Restrict network access to the device to trusted IPs only, reducing exposure to potential attackers.

Configure firewall rules to allow access only from authorized management networks.

🧯 If You Can't Patch

  • Isolate the device on a segmented network with strict access controls to limit attack surface.
  • Monitor for unauthorized login attempts and implement strong authentication mechanisms for administrative access.

🔍 How to Verify

Check if Vulnerable:

Check the firmware version via the device's web interface or CLI; if it is v1.08 or earlier, it is vulnerable.

Check Version:

Use the device's administrative interface or CLI command specific to the EXPLORER 710 to display firmware version.

Verify Fix Applied:

After updating, confirm the firmware version is above v1.08 and test that the old root password no longer works.

📡 Detection & Monitoring

Log Indicators:

  • Failed or successful root login attempts from unexpected IP addresses.
  • Changes to system configuration files or unauthorized access logs.

Network Indicators:

  • Unusual SSH or telnet traffic to the device's management ports.
  • Anomalous data flows indicating potential compromise.

SIEM Query:

Example: 'source="EXPLORER710" AND event_type="authentication" AND user="root"' to monitor for root access attempts.

🔗 References

📤 Share & Export