CVE-2023-44852

8.2 HIGH

📋 TL;DR

This Cross-Site Scripting (XSS) vulnerability in Cobham SAILOR VSAT Ku satellite communication systems allows remote attackers to inject malicious scripts via the SNMP trap configuration interface. When exploited, this could enable attackers to execute arbitrary code in the context of the web application, potentially compromising the satellite terminal's management interface. Organizations using affected versions of this maritime satellite communication equipment are at risk.

💻 Affected Systems

Products:
  • Cobham SAILOR VSAT Ku
Versions: v.164B019
Operating Systems: Embedded system
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface of the satellite terminal. Requires network access to the management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the satellite terminal management system, allowing attackers to reconfigure critical communication parameters, disrupt maritime communications, or pivot to other shipboard systems.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the management interface leading to operational disruption of satellite communications.

🟢

If Mitigated

Limited to interface manipulation without system compromise if proper network segmentation and input validation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the web interface and knowledge of the vulnerable endpoint. The vulnerability is in the c_set_traps_decode function in acu_web file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Contact Cobham/Thales for patch availability. 2. If patch is available, download from official vendor portal. 3. Backup current configuration. 4. Apply patch following vendor instructions. 5. Restart the system. 6. Verify fix implementation.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement strict input validation and output encoding for the SNMP trap configuration interface

Network Segmentation

all

Isolate the satellite terminal management interface from untrusted networks

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to the management interface to authorized personnel only
  • Deploy a web application firewall (WAF) with XSS protection rules in front of the management interface

🔍 How to Verify

Check if Vulnerable:

Check if the system is running version 164B019 of Cobham SAILOR VSAT Ku software. Access the web interface and attempt to inject test payloads into the SNMP trap configuration fields.

Check Version:

Check via web interface: System > About or via CLI if available (vendor-specific command)

Verify Fix Applied:

Verify the software version has been updated beyond 164B019. Test the previously vulnerable endpoint with XSS test payloads to confirm proper input sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SNMP trap configuration changes
  • Malicious script patterns in web server logs
  • Multiple failed login attempts followed by configuration changes

Network Indicators:

  • Unusual traffic patterns to the management interface
  • Suspicious payloads in HTTP requests to acu_web endpoints

SIEM Query:

source="web_logs" AND (uri="*acu_web*" OR uri="*c_set_traps_decode*") AND (content="<script>" OR content="javascript:" OR content="onerror=" OR content="onload=")

🔗 References

📤 Share & Export