Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29120: CWE-798 Use of Hard-coded Credentials in International Datacasting Corporation IDC SFX2100 SuperFlex Satellite Receiver

0
Critical
VulnerabilityCVE-2026-29120cvecve-2026-29120cwe-798
Published: Wed Mar 04 2026 (03/04/2026, 08:10:09 UTC)
Source: CVE Database V5
Vendor/Project: International Datacasting Corporation
Product: IDC SFX2100 SuperFlex Satellite Receiver

Description

The /root/anaconda-ks.cfg installation configuration file in International Datacasting Corporation (IDC) SFX Series(SFX2100) SuperFlex Satellite Receiver insecurely stores the hardcoded root password hash. The password itself is highly insecure and susceptible to offline dictionary attacks using the rockyou.txt wordlist. Because direct root SSH login is disabled, an attacker must first obtain low-privileged access to the system (e.g., via other vulnerabilities) to be able to log in as the root user. The password is hardcoded and so allows for an actor with local access on effected versions to escalate to root

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 19:57:21 UTC

Technical Analysis

CVE-2026-29120 is a critical security vulnerability identified in the International Datacasting Corporation (IDC) SFX2100 SuperFlex Satellite Receiver. The root cause is the insecure storage of a hardcoded root password hash within the /root/anaconda-ks.cfg installation configuration file. This password hash corresponds to a weak password that is highly susceptible to offline dictionary attacks, notably using widely available wordlists such as rockyou.txt. Although direct root SSH login is disabled by default, an attacker who first obtains low-privileged access to the system—potentially through other vulnerabilities or misconfigurations—can leverage this hardcoded credential to escalate privileges to root. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), which is a common and dangerous security flaw because it undermines authentication mechanisms and facilitates unauthorized access. The CVSS v4.0 score of 9.2 (critical) reflects the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity once local access is achieved. The scope is high as the vulnerability affects the entire device, and no user interaction is required. Currently, no public patches or known exploits in the wild have been reported, but the presence of hardcoded credentials in critical satellite communication equipment poses a significant security risk. This vulnerability could allow attackers to fully control the satellite receiver, potentially disrupting broadcast services or enabling further network infiltration.

Potential Impact

The impact of CVE-2026-29120 is severe for organizations relying on IDC SFX2100 SuperFlex Satellite Receivers, particularly those in satellite broadcasting, telecommunications, and defense sectors. An attacker who gains low-privileged access can escalate to root, gaining full control over the device. This could lead to unauthorized interception, manipulation, or disruption of satellite data streams, compromising confidentiality and integrity of transmitted information. The availability of satellite communication services could also be affected, causing operational outages with potentially wide-reaching consequences. Given the critical role of satellite receivers in broadcasting and secure communications, exploitation could facilitate espionage, sabotage, or denial of service attacks. The vulnerability also increases the attack surface by enabling lateral movement within networks if the device is connected to broader infrastructure. Organizations worldwide that deploy these receivers in critical environments face heightened risk of targeted attacks, especially if other vulnerabilities or weak access controls exist that allow initial low-level access.

Mitigation Recommendations

To mitigate CVE-2026-29120, organizations should first identify all IDC SFX2100 SuperFlex Satellite Receivers in their environment. Immediate steps include: (1) auditing the /root/anaconda-ks.cfg file to detect the presence of hardcoded password hashes; (2) changing the root password to a strong, unique value and removing any hardcoded credentials from configuration files; (3) disabling or restricting all non-essential local access methods to minimize the risk of initial low-privileged compromise; (4) implementing network segmentation to isolate satellite receivers from general IT infrastructure; (5) monitoring for unusual authentication attempts or privilege escalations on these devices; (6) applying any vendor-provided patches or firmware updates once available; and (7) employing multi-factor authentication and strict access control policies for administrative access. Additionally, organizations should conduct penetration testing to identify other vulnerabilities that could provide initial access, as exploitation requires prior low-level access. Regularly updating and hardening device configurations and maintaining an inventory of satellite communication assets are critical for ongoing security.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2026-03-04T07:53:45.786Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a7eacbd1a09e29cb189c89

Added to database: 3/4/2026, 8:18:19 AM

Last enriched: 3/11/2026, 7:57:21 PM

Last updated: 4/18/2026, 2:20:28 AM

Views: 132

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses