{"vuid":"VU#882207","idnumber":"882207","name":"Cobham Aviator satellite terminals contain multiple vulnerabilities","keywords":["cobham","aviator","satellite","hardcoded","satcom"],"overview":"Cobham Aviator 700D and 700E satellite terminals contain multiple vulnerabilities.","clean_desc":"Cobham Aviator 700D and 700E satellite communication terminals contain the following vulnerabilities: CWE-327: Use of a Broken or Risky Cryptographic Algorithm - CVE-2014-2942 (Please note that the CVE for this vulnerability has been changed from CVE-2014-2943 to CVE-2014-2942 due to a duplicate CVE identifier.)\nIOActive reports that Cobham satellite terminals utilize a risky algorithm to generate a PIN code for accessing the terminal. The algorithm is reversible and allows a local attacker to generate a superuser PIN code. CWE-798: Use of Hard-coded Credentials - CVE-2014-2964 \nIOActive reports that certain privileged commands in the the satellite terminals require a password to execute. The commands  debug, prod,  do160, and flrp have hardcoded passwords. A local attacker may be able to gain unauthorized privileges using these commands. The vendor Cobham has provided the following statement: Cobham SATCOM has found that potential exploitation of the vulnerabilities presented requires either physical access to the equipment or connectivity to the maintenance part of the network, which also requires a physical presence at the terminal. Specifically, in the aeronautical world, there are very strict requirements for equipment installation and physical access to the equipment is restricted to authorized personnel. The described hardcoded credentials are only accessible via the maintenance port connector on the front-plate and will require direct access to the equipment via a serial port. The SDU is installed in the avionics bay of the aircraft, and is not accessible for unauthorized personnel. Cobham SATCOM will continue to evaluate any potential vulnerabilities with its equipment and implement increased security measures if required.","impact":"A local unauthenticated attacker may be able to gain full control of the satellite terminal.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"Thanks to Ruben Santamarta for reporting this vulnerability.","author":"This document was written by Chris King.","public":["http://www.cobham.com/about-cobham/aerospace-and-security/about-us/satcom/product-range/aeronautical.aspx","http://cwe.mitre.org/data/definitions/327.html","http://cwe.mitre.org/data/definitions/798.html"],"cveids":["CVE-2014-2942","CVE-2014-2964"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-06-20T18:21:00Z","publicdate":"2014-08-07T00:00:00Z","datefirstpublished":"2014-08-07T22:37:58Z","dateupdated":"2014-09-18T18:16:18Z","revision":19,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"L","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"H","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.9","cvss_basevector":"AV:L/AC:M/Au:N/C:C/I:C/A:C","cvss_temporalscore":"6.2","cvss_environmentalscore":"2.02488512192","cvss_environmentalvector":"CDP:H/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}