CVE-2025-41380: CWE-798 Use of Hard-coded Credentials in Intellian Technologies Iridium Certus 700
Iridium Certus 700 version 1.0.1 has an embedded credentials vulnerability in the code. This vulnerability allows a local user to retrieve the SSH hash string.
AI Analysis
Technical Summary
CVE-2025-41380 is a vulnerability identified in Intellian Technologies' Iridium Certus 700 satellite communication terminal, specifically in version 1.0.1. The vulnerability is classified under CWE-798, which pertains to the use of hard-coded credentials within software. In this case, the device's firmware contains embedded credentials that can be accessed by a local user. The vulnerability allows such a user to retrieve the SSH hash string, which could potentially be used to gain unauthorized access to the device. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N) is needed. The vulnerability does not affect confidentiality, integrity, or availability directly (VC:N, VI:N, VA:N), but the scope is high (S: H), indicating that exploitation could impact resources beyond the vulnerable component. The CVSS 4.0 base score is 6.1, categorizing it as a medium severity issue. Although no known exploits are currently in the wild, the presence of hard-coded credentials is a significant security concern, as it can serve as a foothold for lateral movement or privilege escalation within a network. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for mitigation through configuration or operational controls. Given that the Iridium Certus 700 is used for satellite communications, often in critical infrastructure and maritime sectors, the vulnerability could have broader implications if exploited, especially in environments where physical access is possible or where local users have some level of access to the device.
Potential Impact
For European organizations, particularly those in maritime, defense, emergency services, and critical infrastructure sectors that rely on satellite communications, this vulnerability poses a tangible risk. Exploitation could allow an insider or an attacker with physical or local access to extract SSH credentials, potentially enabling unauthorized remote access or control of the communication terminal. This could lead to interception or manipulation of sensitive communications, disruption of satellite connectivity, or use of the device as a pivot point for further network compromise. Given the strategic importance of satellite communications for remote operations and emergency response in Europe, exploitation could degrade operational capabilities and compromise data confidentiality and integrity. Additionally, organizations subject to strict data protection regulations (e.g., GDPR) could face compliance issues if such a breach leads to data exposure. The medium severity rating indicates a moderate risk, but the potential for high-impact consequences in critical sectors elevates the importance of addressing this vulnerability promptly.
Mitigation Recommendations
1. Immediate operational mitigation should include restricting physical and local access to Iridium Certus 700 devices to trusted personnel only, minimizing the risk of local exploitation. 2. Network segmentation should be employed to isolate these devices from broader enterprise networks, limiting lateral movement if credentials are compromised. 3. Monitor device logs and network traffic for unusual SSH access attempts or anomalies that could indicate exploitation attempts. 4. Engage with Intellian Technologies to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 5. If possible, change or disable default or hard-coded credentials through device configuration interfaces, or implement compensating controls such as multi-factor authentication for SSH access. 6. Conduct regular security audits and penetration testing focused on satellite communication devices to identify and remediate similar vulnerabilities proactively. 7. Develop incident response plans that include scenarios involving satellite communication device compromise to ensure rapid containment and recovery.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Norway, Sweden, Finland
CVE-2025-41380: CWE-798 Use of Hard-coded Credentials in Intellian Technologies Iridium Certus 700
Description
Iridium Certus 700 version 1.0.1 has an embedded credentials vulnerability in the code. This vulnerability allows a local user to retrieve the SSH hash string.
AI-Powered Analysis
Technical Analysis
CVE-2025-41380 is a vulnerability identified in Intellian Technologies' Iridium Certus 700 satellite communication terminal, specifically in version 1.0.1. The vulnerability is classified under CWE-798, which pertains to the use of hard-coded credentials within software. In this case, the device's firmware contains embedded credentials that can be accessed by a local user. The vulnerability allows such a user to retrieve the SSH hash string, which could potentially be used to gain unauthorized access to the device. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N) is needed. The vulnerability does not affect confidentiality, integrity, or availability directly (VC:N, VI:N, VA:N), but the scope is high (S: H), indicating that exploitation could impact resources beyond the vulnerable component. The CVSS 4.0 base score is 6.1, categorizing it as a medium severity issue. Although no known exploits are currently in the wild, the presence of hard-coded credentials is a significant security concern, as it can serve as a foothold for lateral movement or privilege escalation within a network. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for mitigation through configuration or operational controls. Given that the Iridium Certus 700 is used for satellite communications, often in critical infrastructure and maritime sectors, the vulnerability could have broader implications if exploited, especially in environments where physical access is possible or where local users have some level of access to the device.
Potential Impact
For European organizations, particularly those in maritime, defense, emergency services, and critical infrastructure sectors that rely on satellite communications, this vulnerability poses a tangible risk. Exploitation could allow an insider or an attacker with physical or local access to extract SSH credentials, potentially enabling unauthorized remote access or control of the communication terminal. This could lead to interception or manipulation of sensitive communications, disruption of satellite connectivity, or use of the device as a pivot point for further network compromise. Given the strategic importance of satellite communications for remote operations and emergency response in Europe, exploitation could degrade operational capabilities and compromise data confidentiality and integrity. Additionally, organizations subject to strict data protection regulations (e.g., GDPR) could face compliance issues if such a breach leads to data exposure. The medium severity rating indicates a moderate risk, but the potential for high-impact consequences in critical sectors elevates the importance of addressing this vulnerability promptly.
Mitigation Recommendations
1. Immediate operational mitigation should include restricting physical and local access to Iridium Certus 700 devices to trusted personnel only, minimizing the risk of local exploitation. 2. Network segmentation should be employed to isolate these devices from broader enterprise networks, limiting lateral movement if credentials are compromised. 3. Monitor device logs and network traffic for unusual SSH access attempts or anomalies that could indicate exploitation attempts. 4. Engage with Intellian Technologies to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 5. If possible, change or disable default or hard-coded credentials through device configuration interfaces, or implement compensating controls such as multi-factor authentication for SSH access. 6. Conduct regular security audits and penetration testing focused on satellite communication devices to identify and remediate similar vulnerabilities proactively. 7. Develop incident response plans that include scenarios involving satellite communication device compromise to ensure rapid containment and recovery.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:57:07.297Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68306f8e0acd01a2492723a6
Added to database: 5/23/2025, 12:52:30 PM
Last enriched: 7/8/2025, 10:57:02 PM
Last updated: 8/12/2025, 6:37:10 AM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.