CVE-2023-44852
📋 TL;DR
This Cross-Site Scripting (XSS) vulnerability in Cobham SAILOR VSAT Ku satellite communication systems allows remote attackers to inject malicious scripts via the SNMP trap configuration interface. When exploited, this could enable attackers to execute arbitrary code in the context of the web application, potentially compromising the satellite terminal's management interface. Organizations using affected versions of this maritime satellite communication equipment are at risk.
💻 Affected Systems
- Cobham SAILOR VSAT Ku
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the satellite terminal management system, allowing attackers to reconfigure critical communication parameters, disrupt maritime communications, or pivot to other shipboard systems.
Likely Case
Session hijacking, credential theft, or defacement of the management interface leading to operational disruption of satellite communications.
If Mitigated
Limited to interface manipulation without system compromise if proper network segmentation and input validation are implemented.
🎯 Exploit Status
Exploitation requires access to the web interface and knowledge of the vulnerable endpoint. The vulnerability is in the c_set_traps_decode function in acu_web file.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Contact Cobham/Thales for patch availability. 2. If patch is available, download from official vendor portal. 3. Backup current configuration. 4. Apply patch following vendor instructions. 5. Restart the system. 6. Verify fix implementation.
🔧 Temporary Workarounds
Input Validation Enhancement
allImplement strict input validation and output encoding for the SNMP trap configuration interface
Network Segmentation
allIsolate the satellite terminal management interface from untrusted networks
🧯 If You Can't Patch
- Implement strict network access controls to limit access to the management interface to authorized personnel only
- Deploy a web application firewall (WAF) with XSS protection rules in front of the management interface
🔍 How to Verify
Check if Vulnerable:
Check if the system is running version 164B019 of Cobham SAILOR VSAT Ku software. Access the web interface and attempt to inject test payloads into the SNMP trap configuration fields.
Check Version:
Check via web interface: System > About or via CLI if available (vendor-specific command)
Verify Fix Applied:
Verify the software version has been updated beyond 164B019. Test the previously vulnerable endpoint with XSS test payloads to confirm proper input sanitization.
📡 Detection & Monitoring
Log Indicators:
- Unusual SNMP trap configuration changes
- Malicious script patterns in web server logs
- Multiple failed login attempts followed by configuration changes
Network Indicators:
- Unusual traffic patterns to the management interface
- Suspicious payloads in HTTP requests to acu_web endpoints
SIEM Query:
source="web_logs" AND (uri="*acu_web*" OR uri="*c_set_traps_decode*") AND (content="<script>" OR content="javascript:" OR content="onerror=" OR content="onload=")