Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28775: CWE-1188: Insecure Default Initialization of Resource in International Datacasting Corporation (IDC) SFX2100 Series SuperFlex SatelliteReceiver

0
Critical
VulnerabilityCVE-2026-28775cvecve-2026-28775cwe-1188
Published: Wed Mar 04 2026 (03/04/2026, 07:24:50 UTC)
Source: CVE Database V5
Vendor/Project: International Datacasting Corporation (IDC)
Product: SFX2100 Series SuperFlex SatelliteReceiver

Description

An unauthenticated Remote Code Execution (RCE) vulnerability exists in the SNMP service of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver. The deployment insecurely provisions the `private` SNMP community string with read/write access by default. Because the SNMP agent runs as root, an unauthenticated remote attacker can utilize `NET-SNMP-EXTEND-MIB` directives, abusing the fact that the system runs a vulnerable version of net-snmp pre 5.8, to execute arbitrary operating system commands with root privileges.

AI-Powered Analysis

AILast updated: 03/04/2026, 07:47:36 UTC

Technical Analysis

CVE-2026-28775 is a critical vulnerability in the SNMP service of the IDC SFX Series SuperFlex SatelliteReceiver, specifically version 101. The root cause is the insecure default initialization of the SNMP private community string, which is set with read/write privileges by default, allowing unauthenticated access. The SNMP agent runs with root privileges and uses a vulnerable version of net-snmp (pre-5.8), which is susceptible to command injection via NET-SNMP-EXTEND-MIB directives. This allows an unauthenticated remote attacker to execute arbitrary operating system commands with root privileges, effectively gaining full control over the device. The vulnerability is categorized under CWE-1188, indicating insecure default initialization of a resource. The CVSS 4.0 vector indicates network attack vector, no required authentication, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability was published on March 4, 2026, and no patches or exploits in the wild have been reported yet. Given the critical nature and ease of exploitation, this vulnerability poses a severe risk to affected devices and their networks.

Potential Impact

The impact of CVE-2026-28775 is severe and multifaceted. Successful exploitation grants an attacker root-level remote code execution capabilities on the satellite receiver device without any authentication or user interaction. This can lead to complete system compromise, including unauthorized access to sensitive data, manipulation or disruption of satellite communication streams, and potential pivoting to other network assets. The availability of satellite communication services could be disrupted, affecting critical infrastructure, broadcasting, and emergency communication systems relying on these devices. The confidentiality and integrity of transmitted data are also at risk, potentially enabling espionage or misinformation campaigns. Organizations worldwide that depend on IDC SFX Series SuperFlex SatelliteReceivers for satellite data transmission or broadcasting are vulnerable to significant operational and reputational damage if exploited.

Mitigation Recommendations

To mitigate CVE-2026-28775, organizations should immediately audit all IDC SFX Series SuperFlex SatelliteReceiver devices to identify affected versions (notably version 101). Since no official patches are currently available, the following steps are recommended: 1) Change the default SNMP private community string from the insecure default to a strong, unique string with limited access rights. 2) Restrict SNMP access via network segmentation and firewall rules to trusted management networks only. 3) Disable SNMP write access if not required or disable SNMP entirely if feasible. 4) Monitor network traffic for unusual SNMP activity, especially NET-SNMP-EXTEND-MIB usage patterns. 5) Engage IDC support channels to obtain firmware updates or patches as soon as they become available. 6) Implement intrusion detection/prevention systems capable of detecting exploitation attempts targeting net-snmp vulnerabilities. 7) Conduct regular security assessments and update device configurations to follow the principle of least privilege. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable service, default credentials, and network exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2026-03-03T09:59:08.426Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a7e053d1a09e29cb12bc27

Added to database: 3/4/2026, 7:33:39 AM

Last enriched: 3/4/2026, 7:47:36 AM

Last updated: 3/4/2026, 8:37:21 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses