Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28775: CWE-1188: Insecure Default Initialization of Resource in International Datacasting Corporation (IDC) SFX2100 Series SuperFlex SatelliteReceiver

0
Critical
VulnerabilityCVE-2026-28775cvecve-2026-28775cwe-1188
Published: Wed Mar 04 2026 (03/04/2026, 07:24:50 UTC)
Source: CVE Database V5
Vendor/Project: International Datacasting Corporation (IDC)
Product: SFX2100 Series SuperFlex SatelliteReceiver

Description

An unauthenticated Remote Code Execution (RCE) vulnerability exists in the SNMP service of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver. The deployment insecurely provisions the `private` SNMP community string with read/write access by default. Because the SNMP agent runs as root, an unauthenticated remote attacker can utilize `NET-SNMP-EXTEND-MIB` directives, abusing the fact that the system runs a vulnerable version of net-snmp pre 5.8, to execute arbitrary operating system commands with root privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 19:55:18 UTC

Technical Analysis

CVE-2026-28775 is a critical vulnerability in the International Datacasting Corporation (IDC) SFX2100 Series SuperFlex SatelliteReceiver's SNMP service. The root cause is the insecure default configuration where the SNMP 'private' community string is provisioned with read/write access without authentication. The SNMP agent runs as root on the device, and it uses a vulnerable version of net-snmp prior to 5.8, which is susceptible to command injection via the NET-SNMP-EXTEND-MIB feature. This feature allows SNMP clients to execute arbitrary shell commands configured on the device. Because the community string is set insecurely by default and no authentication is required, an unauthenticated remote attacker can send crafted SNMP requests to execute arbitrary commands with root privileges. This leads to full system compromise, including the ability to alter device behavior, exfiltrate sensitive data, or disrupt service. The vulnerability affects all devices in the SFX2100 series running the vulnerable net-snmp version. The CVSS 4.0 vector indicates network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No patches or mitigations have been officially released by IDC at the time of publication. No known exploits have been publicly observed, but the ease of exploitation and critical impact make this a severe threat to organizations relying on these satellite receivers.

Potential Impact

The impact of CVE-2026-28775 is severe and wide-ranging. Successful exploitation allows an unauthenticated attacker to execute arbitrary code with root privileges on the affected satellite receivers. This can lead to complete device takeover, enabling attackers to manipulate satellite data streams, disrupt communications, or use the device as a foothold for lateral movement within critical networks. Confidentiality is compromised as attackers can access sensitive operational data. Integrity is at risk because attackers can alter device configurations or data transmissions. Availability can be disrupted by malicious commands causing device crashes or denial of service. Given the role of IDC SFX2100 devices in satellite communications, this vulnerability threatens critical infrastructure sectors such as broadcasting, emergency services, military communications, and remote data distribution. The lack of authentication and default insecure configuration significantly increases the risk of widespread exploitation, especially in environments with exposed SNMP services.

Mitigation Recommendations

Immediate mitigation steps include restricting network access to the SNMP service on IDC SFX2100 devices, ideally limiting it to trusted management networks and blocking access from untrusted sources. Administrators should change the default 'private' SNMP community string to a strong, unique value with read-only permissions or disable SNMP entirely if not required. Network-level controls such as firewall rules and intrusion detection/prevention systems should be configured to detect and block suspicious SNMP traffic, especially NET-SNMP-EXTEND-MIB requests. Monitoring SNMP logs and network traffic for unusual commands or access attempts is critical. Organizations should engage with IDC for official patches or firmware updates addressing the vulnerable net-snmp version and apply them promptly once available. As a longer-term measure, consider segmenting satellite receiver devices from general enterprise networks to reduce exposure. Incident response plans should be updated to include detection and remediation procedures for this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2026-03-03T09:59:08.426Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a7e053d1a09e29cb12bc27

Added to database: 3/4/2026, 7:33:39 AM

Last enriched: 3/11/2026, 7:55:18 PM

Last updated: 4/18/2026, 2:02:32 AM

Views: 150

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses