Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29120: CWE-798 Use of Hard-coded Credentials in International Datacasting Corporation IDC SFX2100 SuperFlex Satellite Receiver

0
Critical
VulnerabilityCVE-2026-29120cvecve-2026-29120cwe-798
Published: Wed Mar 04 2026 (03/04/2026, 08:10:09 UTC)
Source: CVE Database V5
Vendor/Project: International Datacasting Corporation
Product: IDC SFX2100 SuperFlex Satellite Receiver

Description

The /root/anaconda-ks.cfg installation configuration file in International Datacasting Corporation (IDC) SFX Series(SFX2100) SuperFlex Satellite Receiver insecurely stores the hardcoded root password hash. The password itself is highly insecure and susceptible to offline dictionary attacks using the rockyou.txt wordlist. Because direct root SSH login is disabled, an attacker must first obtain low-privileged access to the system (e.g., via other vulnerabilities) to be able to log in as the root user. The password is hardcoded and so allows for an actor with local access on effected versions to escalate to root

AI-Powered Analysis

AILast updated: 03/04/2026, 08:32:36 UTC

Technical Analysis

CVE-2026-29120 identifies a critical security flaw in the IDC SFX2100 SuperFlex Satellite Receiver, where the root password hash is hardcoded and stored insecurely within the /root/anaconda-ks.cfg installation configuration file. This password hash is weak and susceptible to offline dictionary attacks using widely available wordlists such as rockyou.txt. Although direct root SSH login is disabled by default, an attacker who first gains low-privileged access to the system—potentially through other vulnerabilities or misconfigurations—can attempt to crack the root password offline. Once the password is recovered, the attacker can escalate privileges to root, gaining full control over the device. This vulnerability falls under CWE-798 (Use of Hard-coded Credentials), which is a common and dangerous security weakness. The CVSS 4.0 score of 9.2 reflects the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no requirement for user interaction. The affected product, the SFX2100, is used in satellite broadcasting and datacasting, making it a high-value target for attackers aiming to disrupt or manipulate satellite communications infrastructure. No patches or mitigations have been officially released at the time of publication, and no exploits have been observed in the wild, but the risk remains significant due to the ease of offline password cracking once local access is obtained.

Potential Impact

The impact of this vulnerability is substantial for organizations relying on IDC SFX2100 SuperFlex Satellite Receivers. Successful exploitation allows attackers to escalate from low-privileged user accounts to root, granting full control over the device. This can lead to unauthorized access to sensitive satellite broadcast data, manipulation or disruption of satellite communications, and potential pivoting into broader network environments. The confidentiality of transmitted data can be compromised, integrity of broadcast content can be altered, and availability of satellite services can be disrupted, affecting critical communications infrastructure. Given the specialized nature of the device, exploitation could impact media companies, government agencies, defense contractors, and telecommunications providers. The requirement for initial local access limits remote exploitation but does not eliminate risk, especially in environments where physical or network access controls are weak or where other vulnerabilities exist. The lack of known exploits in the wild suggests limited current exploitation but also highlights the need for proactive mitigation before attackers develop and deploy exploit tools.

Mitigation Recommendations

Organizations should implement a multi-layered mitigation strategy: 1) Restrict and monitor all local access to the IDC SFX2100 devices, ensuring only authorized personnel have physical or network-level access. 2) Conduct comprehensive vulnerability assessments and penetration tests to identify and remediate any other vulnerabilities that could provide initial low-privileged access. 3) Change the hardcoded root password if possible, or apply vendor-provided patches or configuration updates once available. 4) Employ strong network segmentation to isolate satellite receivers from general enterprise networks, reducing the attack surface. 5) Implement strict logging and alerting on authentication attempts and privilege escalations to detect suspicious activity early. 6) If vendor support is unavailable or delayed, consider deploying compensating controls such as disabling unnecessary services, enforcing strict firewall rules, and using host-based intrusion detection systems. 7) Maintain up-to-date backups and incident response plans tailored to satellite communication infrastructure. 8) Engage with IDC or authorized vendors for official patches or firmware updates addressing this vulnerability as soon as they are released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2026-03-04T07:53:45.786Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a7eacbd1a09e29cb189c89

Added to database: 3/4/2026, 8:18:19 AM

Last enriched: 3/4/2026, 8:32:36 AM

Last updated: 3/4/2026, 9:21:09 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses