Cobham Satcom Sailor 800 / 900 VSAT Vulnerabilities
The CyberSKR Maritime Security Team recently identified multiple vulenerabilities in Cobham Satcom products, specifically the Sailor 800 / 900 VSAT systems (version(s) N/A).
The vendor’s response was excellent, and we were put in contact with a senior member of the company almost immediately, who was able to action the information we provided them with in a very timely manner.Vulnerability Overview – Cobham Satcom Sailor 800 / 900
- Arbitrary Configuration File Modification (Multiple Vectors, Potential For Denial of Service)
- Persistent Cross Site Scripting (XSS)
CVE-2018-19393: Sailor 800 / 900 Arbitrary Configuration Modification
A vulnerability was identified in the Cobham Satcom Sailor 800 / 900 VSAT systems, which could allow a threat actor to modify the device's configuration file. This includes inserting their own entries, or overriding current ones.
Utilising the same attack vector, a further payload was also identified that led to a Denial of Service (DoS) condition, wherein the system became fully unresponsive and required resetting before normal operation could resume.
Further details & PoC withheld until later date
CVE-2018-19394: Sailor 800 / 900 Persistent XSS