Skip to main content

CVE-2025-41380: CWE-798 Use of Hard-coded Credentials in Intellian Technologies Iridium Certus 700

Medium
VulnerabilityCVE-2025-41380cvecve-2025-41380cwe-798
Published: Fri May 23 2025 (05/23/2025, 12:41:58 UTC)
Source: CVE
Vendor/Project: Intellian Technologies
Product: Iridium Certus 700

Description

Iridium Certus 700 version 1.0.1 has an embedded credentials vulnerability in the code. This vulnerability allows a local user to retrieve the SSH hash string.

AI-Powered Analysis

AILast updated: 07/08/2025, 22:57:02 UTC

Technical Analysis

CVE-2025-41380 is a vulnerability identified in Intellian Technologies' Iridium Certus 700 satellite communication terminal, specifically in version 1.0.1. The vulnerability is classified under CWE-798, which pertains to the use of hard-coded credentials within software. In this case, the device's firmware contains embedded credentials that can be accessed by a local user. The vulnerability allows such a user to retrieve the SSH hash string, which could potentially be used to gain unauthorized access to the device. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N) is needed. The vulnerability does not affect confidentiality, integrity, or availability directly (VC:N, VI:N, VA:N), but the scope is high (S: H), indicating that exploitation could impact resources beyond the vulnerable component. The CVSS 4.0 base score is 6.1, categorizing it as a medium severity issue. Although no known exploits are currently in the wild, the presence of hard-coded credentials is a significant security concern, as it can serve as a foothold for lateral movement or privilege escalation within a network. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for mitigation through configuration or operational controls. Given that the Iridium Certus 700 is used for satellite communications, often in critical infrastructure and maritime sectors, the vulnerability could have broader implications if exploited, especially in environments where physical access is possible or where local users have some level of access to the device.

Potential Impact

For European organizations, particularly those in maritime, defense, emergency services, and critical infrastructure sectors that rely on satellite communications, this vulnerability poses a tangible risk. Exploitation could allow an insider or an attacker with physical or local access to extract SSH credentials, potentially enabling unauthorized remote access or control of the communication terminal. This could lead to interception or manipulation of sensitive communications, disruption of satellite connectivity, or use of the device as a pivot point for further network compromise. Given the strategic importance of satellite communications for remote operations and emergency response in Europe, exploitation could degrade operational capabilities and compromise data confidentiality and integrity. Additionally, organizations subject to strict data protection regulations (e.g., GDPR) could face compliance issues if such a breach leads to data exposure. The medium severity rating indicates a moderate risk, but the potential for high-impact consequences in critical sectors elevates the importance of addressing this vulnerability promptly.

Mitigation Recommendations

1. Immediate operational mitigation should include restricting physical and local access to Iridium Certus 700 devices to trusted personnel only, minimizing the risk of local exploitation. 2. Network segmentation should be employed to isolate these devices from broader enterprise networks, limiting lateral movement if credentials are compromised. 3. Monitor device logs and network traffic for unusual SSH access attempts or anomalies that could indicate exploitation attempts. 4. Engage with Intellian Technologies to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 5. If possible, change or disable default or hard-coded credentials through device configuration interfaces, or implement compensating controls such as multi-factor authentication for SSH access. 6. Conduct regular security audits and penetration testing focused on satellite communication devices to identify and remediate similar vulnerabilities proactively. 7. Develop incident response plans that include scenarios involving satellite communication device compromise to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:57:07.297Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68306f8e0acd01a2492723a6

Added to database: 5/23/2025, 12:52:30 PM

Last enriched: 7/8/2025, 10:57:02 PM

Last updated: 8/12/2025, 6:37:10 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats