CVE-2026-29128: CWE-522 Insufficiently Protected Credentials in International Datacasting Corporation SFX2100 Satellite Receiver
IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration files for routing components (e.g., zebra, bgpd, ospfd, and ripd) that are owned by root but world-readable. The configuration files (e.g., zebra.conf, bgpd.conf, ospfd.conf, ripd.conf) contain hardcoded or otherwise insecure plaintext passwords (including “enable”/privileged-mode credentials). A remote actor is able to abuse the reuse/hardcoded nature of these credentials to further access other systems in the network, gain a foothold on the satellite receiver or potentially locally privilege escalate.
AI Analysis
Technical Summary
CVE-2026-29128 identifies a critical security weakness in the firmware of the International Datacasting Corporation (IDC) SFX2100 Satellite Receiver. The firmware includes multiple daemon configuration files for routing protocols such as zebra, bgpd, ospfd, and ripd. These files are owned by root but are world-readable, exposing sensitive configuration data to any user or process on the device. Critically, these configuration files contain hardcoded or otherwise insecure plaintext passwords, including 'enable' or privileged-mode credentials that grant elevated access. The presence of these credentials in accessible files violates secure credential storage best practices (CWE-522 and CWE-798). An attacker with local or limited remote access can read these files to obtain credentials, enabling them to escalate privileges on the satellite receiver or pivot to other networked systems. The vulnerability requires a low-level privilege attacker and has a high attack complexity, but no user interaction is necessary. The scope and impact are high due to the potential compromise of satellite communication infrastructure, which is often critical for broadcasting and data transmission. No patches or exploits are currently known, but the risk remains significant given the sensitive environment and the ease of credential extraction from world-readable files.
Potential Impact
The exploitation of this vulnerability can lead to unauthorized access and control over the SFX2100 Satellite Receiver, potentially allowing attackers to manipulate satellite data routing and communication. This can disrupt broadcast services, degrade data integrity, and compromise confidentiality of transmitted information. Furthermore, attackers can leverage the hardcoded credentials to move laterally within the network, gaining footholds on other critical systems. The impact extends to operational disruptions in broadcasting, emergency communications, and other satellite-dependent services, potentially affecting national security and commercial operations. Given the high privilege level of the exposed credentials, attackers could also perform local privilege escalation, increasing their control over the device and network. The high CVSS score reflects the serious risk to confidentiality, integrity, and availability of satellite communication infrastructure.
Mitigation Recommendations
Organizations should immediately audit the SFX2100 Satellite Receiver configuration files to identify and restrict access to sensitive daemon configuration files. File permissions must be tightened to prevent world-readable access, ensuring only root or authorized processes can read these files. Replace all hardcoded plaintext passwords with securely stored, unique credentials, preferably using encrypted credential storage or hardware security modules if supported. Implement network segmentation to isolate satellite receivers from broader enterprise networks, limiting lateral movement opportunities. Monitor device logs and network traffic for unusual access patterns or attempts to read configuration files. Engage with IDC for firmware updates or patches addressing this issue and apply them promptly once available. Additionally, consider deploying intrusion detection systems tailored to satellite communication protocols to detect exploitation attempts. Regularly review and update security policies governing satellite infrastructure to incorporate lessons learned from this vulnerability.
Affected Countries
United States, Canada, Australia, United Kingdom, Germany, France, Japan, South Korea, India, Brazil
CVE-2026-29128: CWE-522 Insufficiently Protected Credentials in International Datacasting Corporation SFX2100 Satellite Receiver
Description
IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration files for routing components (e.g., zebra, bgpd, ospfd, and ripd) that are owned by root but world-readable. The configuration files (e.g., zebra.conf, bgpd.conf, ospfd.conf, ripd.conf) contain hardcoded or otherwise insecure plaintext passwords (including “enable”/privileged-mode credentials). A remote actor is able to abuse the reuse/hardcoded nature of these credentials to further access other systems in the network, gain a foothold on the satellite receiver or potentially locally privilege escalate.
AI-Powered Analysis
Technical Analysis
CVE-2026-29128 identifies a critical security weakness in the firmware of the International Datacasting Corporation (IDC) SFX2100 Satellite Receiver. The firmware includes multiple daemon configuration files for routing protocols such as zebra, bgpd, ospfd, and ripd. These files are owned by root but are world-readable, exposing sensitive configuration data to any user or process on the device. Critically, these configuration files contain hardcoded or otherwise insecure plaintext passwords, including 'enable' or privileged-mode credentials that grant elevated access. The presence of these credentials in accessible files violates secure credential storage best practices (CWE-522 and CWE-798). An attacker with local or limited remote access can read these files to obtain credentials, enabling them to escalate privileges on the satellite receiver or pivot to other networked systems. The vulnerability requires a low-level privilege attacker and has a high attack complexity, but no user interaction is necessary. The scope and impact are high due to the potential compromise of satellite communication infrastructure, which is often critical for broadcasting and data transmission. No patches or exploits are currently known, but the risk remains significant given the sensitive environment and the ease of credential extraction from world-readable files.
Potential Impact
The exploitation of this vulnerability can lead to unauthorized access and control over the SFX2100 Satellite Receiver, potentially allowing attackers to manipulate satellite data routing and communication. This can disrupt broadcast services, degrade data integrity, and compromise confidentiality of transmitted information. Furthermore, attackers can leverage the hardcoded credentials to move laterally within the network, gaining footholds on other critical systems. The impact extends to operational disruptions in broadcasting, emergency communications, and other satellite-dependent services, potentially affecting national security and commercial operations. Given the high privilege level of the exposed credentials, attackers could also perform local privilege escalation, increasing their control over the device and network. The high CVSS score reflects the serious risk to confidentiality, integrity, and availability of satellite communication infrastructure.
Mitigation Recommendations
Organizations should immediately audit the SFX2100 Satellite Receiver configuration files to identify and restrict access to sensitive daemon configuration files. File permissions must be tightened to prevent world-readable access, ensuring only root or authorized processes can read these files. Replace all hardcoded plaintext passwords with securely stored, unique credentials, preferably using encrypted credential storage or hardware security modules if supported. Implement network segmentation to isolate satellite receivers from broader enterprise networks, limiting lateral movement opportunities. Monitor device logs and network traffic for unusual access patterns or attempts to read configuration files. Engage with IDC for firmware updates or patches addressing this issue and apply them promptly once available. Additionally, consider deploying intrusion detection systems tailored to satellite communication protocols to detect exploitation attempts. Regularly review and update security policies governing satellite infrastructure to incorporate lessons learned from this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Gridware
- Date Reserved
- 2026-03-04T07:53:45.786Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a915a0d1a09e29cbe15aae
Added to database: 3/5/2026, 5:33:20 AM
Last enriched: 3/5/2026, 5:47:37 AM
Last updated: 3/5/2026, 9:22:35 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28551: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS
MediumCVE-2026-28548: CWE-269 Improper Privilege Management in Huawei HarmonyOS
HighCVE-2026-28542: CWE-755 Improper Handling of Exceptional Conditions in Huawei HarmonyOS
HighCVE-2026-28549: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Huawei HarmonyOS
MediumCVE-2026-28547: CWE-824 Access of Uninitialized Pointer in Huawei HarmonyOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.