Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29128: CWE-522 Insufficiently Protected Credentials in International Datacasting Corporation SFX2100 Satellite Receiver

0
High
VulnerabilityCVE-2026-29128cvecve-2026-29128cwe-522cwe-798
Published: Thu Mar 05 2026 (03/05/2026, 05:12:35 UTC)
Source: CVE Database V5
Vendor/Project: International Datacasting Corporation
Product: SFX2100 Satellite Receiver

Description

IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration files for routing components (e.g., zebra, bgpd, ospfd, and ripd) that are owned by root but world-readable. The configuration files (e.g., zebra.conf, bgpd.conf, ospfd.conf, ripd.conf) contain hardcoded or otherwise insecure plaintext passwords (including “enable”/privileged-mode credentials). A remote actor is able to abuse the reuse/hardcoded nature of these credentials to further access other systems in the network, gain a foothold on the satellite receiver or potentially locally privilege escalate.

AI-Powered Analysis

AILast updated: 03/05/2026, 05:47:37 UTC

Technical Analysis

CVE-2026-29128 identifies a critical security weakness in the firmware of the International Datacasting Corporation (IDC) SFX2100 Satellite Receiver. The firmware includes multiple daemon configuration files for routing protocols such as zebra, bgpd, ospfd, and ripd. These files are owned by root but are world-readable, exposing sensitive configuration data to any user or process on the device. Critically, these configuration files contain hardcoded or otherwise insecure plaintext passwords, including 'enable' or privileged-mode credentials that grant elevated access. The presence of these credentials in accessible files violates secure credential storage best practices (CWE-522 and CWE-798). An attacker with local or limited remote access can read these files to obtain credentials, enabling them to escalate privileges on the satellite receiver or pivot to other networked systems. The vulnerability requires a low-level privilege attacker and has a high attack complexity, but no user interaction is necessary. The scope and impact are high due to the potential compromise of satellite communication infrastructure, which is often critical for broadcasting and data transmission. No patches or exploits are currently known, but the risk remains significant given the sensitive environment and the ease of credential extraction from world-readable files.

Potential Impact

The exploitation of this vulnerability can lead to unauthorized access and control over the SFX2100 Satellite Receiver, potentially allowing attackers to manipulate satellite data routing and communication. This can disrupt broadcast services, degrade data integrity, and compromise confidentiality of transmitted information. Furthermore, attackers can leverage the hardcoded credentials to move laterally within the network, gaining footholds on other critical systems. The impact extends to operational disruptions in broadcasting, emergency communications, and other satellite-dependent services, potentially affecting national security and commercial operations. Given the high privilege level of the exposed credentials, attackers could also perform local privilege escalation, increasing their control over the device and network. The high CVSS score reflects the serious risk to confidentiality, integrity, and availability of satellite communication infrastructure.

Mitigation Recommendations

Organizations should immediately audit the SFX2100 Satellite Receiver configuration files to identify and restrict access to sensitive daemon configuration files. File permissions must be tightened to prevent world-readable access, ensuring only root or authorized processes can read these files. Replace all hardcoded plaintext passwords with securely stored, unique credentials, preferably using encrypted credential storage or hardware security modules if supported. Implement network segmentation to isolate satellite receivers from broader enterprise networks, limiting lateral movement opportunities. Monitor device logs and network traffic for unusual access patterns or attempts to read configuration files. Engage with IDC for firmware updates or patches addressing this issue and apply them promptly once available. Additionally, consider deploying intrusion detection systems tailored to satellite communication protocols to detect exploitation attempts. Regularly review and update security policies governing satellite infrastructure to incorporate lessons learned from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2026-03-04T07:53:45.786Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a915a0d1a09e29cbe15aae

Added to database: 3/5/2026, 5:33:20 AM

Last enriched: 3/5/2026, 5:47:37 AM

Last updated: 3/5/2026, 9:22:35 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses