Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28778: CWE-798 Use of Hard-coded Credentials in International Datacasting Corporation (IDC) IDC SFX2100 SuperFlex Satellite Receiver

0
High
VulnerabilityCVE-2026-28778cvecve-2026-28778cwe-798
Published: Wed Mar 04 2026 (03/04/2026, 07:49:10 UTC)
Source: CVE Database V5
Vendor/Project: International Datacasting Corporation (IDC)
Product: IDC SFX2100 SuperFlex Satellite Receiver

Description

International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver contains undocumented, hardcoded/insecure credentials for the `xd` user account. A remote unauthenticated attacker can log in via FTP using these credentials. Because the `xd` user has write permissions to their home directory where root-executed binaries and symlinks (such as those invoked by `xdstartstop`) are stored, the attacker can overwrite these files or manipulate symlinks to achieve arbitrary code execution as the root user.

AI-Powered Analysis

AILast updated: 03/04/2026, 08:17:37 UTC

Technical Analysis

The CVE-2026-28778 vulnerability affects the IDC SFX2100 SuperFlex Satellite Receiver, a device used in satellite data broadcasting. The core issue is the presence of hardcoded, undocumented credentials for the 'xd' user account embedded within the device's firmware. These credentials allow an unauthenticated remote attacker to access the device via FTP. The 'xd' user has write permissions to its home directory, which contains binaries and symbolic links executed by root-level processes such as 'xdstartstop'. By overwriting these files or manipulating symlinks, an attacker can escalate privileges and execute arbitrary code with root privileges, effectively compromising the entire system. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), which is a critical security flaw because it bypasses authentication controls. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high scope impact (S:H) with high confidentiality, integrity, and availability impacts (VC:H, VI:H, VA:H). There are no patches currently available, and no known exploits have been reported in the wild as of the publication date. The vulnerability affects version 2100 of the IDC SFX2100 product line. Given the device’s role in satellite communications, exploitation could disrupt critical data broadcasting services or allow attackers to use the compromised device as a foothold into sensitive networks.

Potential Impact

The impact of this vulnerability is significant for organizations relying on IDC SFX2100 satellite receivers, particularly those in broadcasting, defense, emergency services, and telecommunications sectors. Successful exploitation allows remote attackers to gain root-level control without authentication or user interaction, enabling full system compromise. This could lead to unauthorized data access, manipulation or disruption of satellite data streams, and potential lateral movement within the victim’s network. The ability to execute arbitrary code as root could also allow attackers to install persistent malware, disrupt service availability, or use the device as a launchpad for further attacks. Given the critical infrastructure role of satellite receivers, exploitation could have cascading effects on communication reliability and data integrity. The lack of patches increases the window of exposure, and the hardcoded credentials mean that detection and prevention are challenging without network-level controls or device replacement.

Mitigation Recommendations

1. Immediate mitigation should include network segmentation to isolate IDC SFX2100 devices from untrusted networks and restrict FTP access to trusted management hosts only. 2. Implement strict firewall rules to block external FTP access to these devices. 3. Monitor FTP login attempts and unusual file modifications in the 'xd' user home directory to detect potential exploitation attempts. 4. If possible, disable FTP services on the device or replace them with secure alternatives that do not rely on hardcoded credentials. 5. Engage with IDC for firmware updates or patches addressing this vulnerability; if none are available, consider device replacement or additional compensating controls. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous FTP activity and privilege escalation attempts. 7. Conduct regular audits of satellite receiver configurations and credentials to identify unauthorized changes. 8. Develop incident response plans specific to satellite communication infrastructure compromise. 9. For long-term security, advocate for vendor transparency and secure credential management practices in satellite communication devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2026-03-03T09:59:08.426Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a7e744d1a09e29cb1613f5

Added to database: 3/4/2026, 8:03:16 AM

Last enriched: 3/4/2026, 8:17:37 AM

Last updated: 3/4/2026, 9:21:11 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses