Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29119: CWE-798: Use of Hard-coded Credentials in International Datacasting Corporation (IDC) SFX2100 Series SuperFlex SatelliteReceiver

0
High
VulnerabilityCVE-2026-29119cvecve-2026-29119cwe-798
Published: Wed Mar 04 2026 (03/04/2026, 07:58:16 UTC)
Source: CVE Database V5
Vendor/Project: International Datacasting Corporation (IDC)
Product: SFX2100 Series SuperFlex SatelliteReceiver

Description

International Datacasting Corporation (IDC) SFX Series SuperFlex(SFX2100) SatelliteReceiver contains hardcoded and insecure credentials for the `admin` account. A remote unauthenticated attacker can use these undocumented credentials to access the satellite system directly via the Telnet service, leading to potential system compromise.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 19:57:03 UTC

Technical Analysis

CVE-2026-29119 identifies a critical security vulnerability in the International Datacasting Corporation (IDC) SFX2100 Series SuperFlex SatelliteReceiver. The root cause is the presence of hardcoded credentials embedded within the device firmware for the 'admin' account. These credentials are undocumented and cannot be changed by the end user, violating secure credential management best practices (CWE-798). The device exposes a Telnet service that accepts these credentials, allowing a remote attacker to connect without prior authentication or user interaction. Exploiting this vulnerability grants the attacker administrative access to the satellite receiver, enabling them to manipulate device configurations, intercept or alter broadcast data, or disrupt service availability. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges or user interaction required, reflected in its CVSS 4.0 vector: AV:N/AC:L/AT:N/PR:N/UI:N. The impact on confidentiality is high due to potential data interception, integrity is low to medium depending on attacker actions, and availability impact is low to medium. Although no public exploits are reported, the presence of hardcoded credentials is a well-known risk factor that can be leveraged by attackers once discovered. The vulnerability affects all versions of the SFX2100 product line, which is used globally in satellite data broadcasting and transmission infrastructures.

Potential Impact

The exploitation of CVE-2026-29119 can have severe consequences for organizations relying on IDC SFX2100 satellite receivers. Unauthorized administrative access could lead to interception or manipulation of sensitive broadcast data, undermining confidentiality. Attackers could alter device configurations, potentially disrupting satellite data transmission and impacting availability of critical communication services. This could affect broadcasters, emergency services, government agencies, and commercial enterprises dependent on satellite data. The integrity of transmitted data could be compromised, leading to misinformation or corrupted content delivery. Given the remote and unauthenticated nature of the exploit, attackers can operate stealthily and at scale if network exposure is not controlled. The lack of known patches or vendor updates at the time of disclosure increases the risk window. Organizations may face operational disruptions, reputational damage, and regulatory consequences if sensitive data is compromised or services interrupted.

Mitigation Recommendations

To mitigate CVE-2026-29119, organizations should immediately disable the Telnet service on all IDC SFX2100 devices if possible, as Telnet is inherently insecure and facilitates exploitation. Network segmentation and strict firewall rules should be implemented to restrict access to the satellite receivers only to trusted management networks. If disabling Telnet is not feasible, restrict access to the service using IP whitelisting and VPN tunnels to limit exposure. Organizations should engage with IDC to request firmware updates or patches that remove or allow changing the hardcoded credentials. In the absence of vendor patches, consider deploying compensating controls such as intrusion detection systems (IDS) to monitor for unauthorized Telnet access attempts. Regularly audit device configurations and network logs for suspicious activity. Additionally, consider migrating to more secure management protocols (e.g., SSH) and enforce strong authentication mechanisms. Establish incident response plans specific to satellite infrastructure compromise scenarios. Finally, maintain awareness of vendor advisories and threat intelligence updates related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2026-03-04T07:53:45.785Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a7eacbd1a09e29cb189c86

Added to database: 3/4/2026, 8:18:19 AM

Last enriched: 3/11/2026, 7:57:03 PM

Last updated: 4/18/2026, 2:51:24 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses