Skip to main content
Mallory

Unpatched IDC SFX2100 Satellite Receiver Vulnerabilities Expose Critical Infrastructure to Remote Compromise

embedded-device-vulnerabilitydefault-credential-exposurecritical-infrastructure-threatcredential-access-methodlateral-movement-method
Updated March 21, 2026 at 12:53 PM2 sources
Share:
Unpatched IDC SFX2100 Satellite Receiver Vulnerabilities Expose Critical Infrastructure to Remote Compromise

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

A security researcher publicly disclosed 20+ vulnerabilities in the International Data Casting (IDC) SFX2100 satellite receiver, a device reported as deployed across U.S. Department of Defense, European Space Agency, and other critical infrastructure environments, after the vendor allegedly failed to respond to repeated disclosure attempts over several months. Reported issues span common embedded-device failure modes including hardcoded credentials, unauthenticated remote code execution, OS command injection, path traversal, and overly permissive filesystem configurations, with CVEs assigned across CVE-2026-28769 through CVE-2026-29128. One highlighted high-impact issue, CVE-2026-28775, reportedly enables unauthenticated command execution as root by abusing SNMP management functionality combined with a default read-write community string of private.

Additional detail on the credential exposure risk is captured in CVE-2026-29128, which describes world-readable routing daemon configuration files (e.g., zebra.conf, bgpd.conf, ospfd.conf, ripd.conf) that are root-owned but readable by all users and contain plaintext/hardcoded passwords (including privileged “enable” credentials). This condition can enable credential reuse and lateral movement, potentially helping an attacker establish or deepen access within networks where the SFX2100 is deployed, and it compounds other reported weaknesses such as undocumented default accounts (e.g., admin, monitor, user, xd) allegedly sharing a weak password (12345).

Timeline

  1. Mar 6, 2026

    Public reporting notes IDC had issued no statement or patches

    Coverage of the disclosure stated that IDC had not released a public advisory, statement, or patches for the SFX2100 vulnerabilities as of publication. The researcher recommended that affected organizations inventory and isolate exposed devices until fixes become available.

  2. Mar 6, 2026

    Researcher publicly discloses 20+ unpatched SFX2100 vulnerabilities

    After receiving no vendor response, the researcher publicly disclosed more than 20 security flaws in IDC's SFX2100 satellite receiver. The disclosure highlighted severe risks to deployments used by organizations including the U.S. Department of Defense, the European Space Agency, and other critical infrastructure operators.

  3. Mar 5, 2026

    CVE-2026-29128 details published for world-readable credential files

    Public vulnerability details were released for CVE-2026-29128, describing world-readable routing daemon configuration files on the SFX2100 that expose plaintext passwords, including privileged enable credentials. The disclosure warned the credentials could be reused to access other network systems and potentially help an attacker gain a foothold or escalate privileges.

  4. Mar 5, 2026

    Twenty SFX2100 vulnerabilities receive CVE assignments

    Twenty vulnerabilities affecting the IDC SFX2100 satellite receiver were assigned CVEs in the range CVE-2026-28769 through CVE-2026-29128. The issues included hardcoded credentials, unauthenticated remote code execution, command injection, path traversal, and weak filesystem permissions.

  5. Dec 6, 2025

    Researcher reports SFX2100 flaws to IDC during 90-day disclosure window

    A penetration tester repeatedly attempted to disclose more than 20 vulnerabilities in IDC's SFX2100 satellite receiver to the vendor over several months, including outreach within a 90-day responsible disclosure period. IDC reportedly did not respond to the disclosure attempts.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Related Stories

Critical RCE and Default Password Flaws Disclosed in Silex SD-330AC and AMC Manager

Critical RCE and Default Password Flaws Disclosed in Silex SD-330AC and AMC Manager

Silex Technology's **SD-330AC** and **AMC Manager** were disclosed with two serious vulnerabilities that expose devices to remote compromise and unauthorized reconfiguration. The most severe issue, `CVE-2026-32956`, is a **heap-based buffer overflow** in redirect URL processing that can enable **arbitrary code execution** over the network without authentication or user interaction. The flaw is tracked as `CWE-122` and carries a critical `CVSS v3.1` vector of `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`, indicating full compromise of confidentiality, integrity, and availability is possible. A second flaw, `CVE-2026-32965`, affects devices left in their **factory-default state** and allows them to be configured with a **null string password**, creating an insecure initialization condition. Classified as `CWE-1188`, the vulnerability is network-accessible and primarily threatens device integrity, with a `CVSS v3.1` vector of `AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`. The issues were reported through **JPCERT/CC** and published via **JVN** and Silex security advisories in Japanese and English, putting administrators on notice to review exposed deployments and initialization practices.

1 weeks ago
Multiple High-Severity Vulnerability Disclosures Across ICS, Open-Source Software, and SOHO Routers

Multiple High-Severity Vulnerability Disclosures Across ICS, Open-Source Software, and SOHO Routers

Public disclosures highlighted multiple high-severity vulnerabilities across industrial control systems, open-source software, and consumer networking gear, with several issues enabling **unauthenticated remote compromise**. Johnson Controls disclosed **CVE-2025-26385** (CVSS 10.0), a critical SQL injection affecting multiple building/ICS management products (including *ADS/ADX, LCS8500, NAE8500, SCT, CCT*) that can allow remote, unauthenticated attackers to execute arbitrary SQL to alter/delete/exfiltrate data; CISA guidance emphasized isolating control system networks from the internet, segmentation, and controlled remote access (e.g., VPNs). Additional unauthenticated remote issues include **CVE-2026-25069** in *SunFounder Pironman Dashboard* (path traversal in log API endpoints enabling arbitrary file read/deletion) and **CVE-2025-51958** in the *DokuWiki* `runcommand` plugin (unauthenticated command execution via `lib/plugins/runcommand/postaction.php`). Other disclosures include developer-tooling and application-layer injection flaws and multiple router memory-corruption bugs with public exploit references. *Orval* fixed **CVE-2026-25141**, a code-injection issue where incomplete escaping can be bypassed using **JSFuck**-style payloads, and *Cybersecurity AI (CAI)* addressed **CVE-2026-25130**, where `subprocess.Popen(..., shell=True)` enables argument/command injection leading to RCE (notably via the `find_file()` tool). Data-layer issues include **CVE-2025-69662** in *geopandas* (`to_postgis()` SQL injection) and **CVE-2026-24854** in *ChurchCRM* (authenticated SQL injection via `PerID` in `/PaddleNumEditor.php`, patched in 6.7.2), while **CVE-2025-36384** affects *IBM Db2 for Windows* (local privilege escalation via unquoted search path). SOHO router flaws **CVE-2026-1686** (*Totolink A3600R*) and **CVE-2026-1637** (*Tenda AC21*) describe remotely reachable buffer/stack overflows with publicly available exploit material, increasing the likelihood of opportunistic exploitation where exposed management interfaces exist.

1 months ago
Multiple Critical Vulnerabilities Disclosed Across Major Software and Hardware Platforms

Multiple Critical Vulnerabilities Disclosed Across Major Software and Hardware Platforms

Several critical vulnerabilities have been disclosed affecting a range of widely used software frameworks and hardware platforms. Notable issues include a critical flaw in the Apache bRPC framework (CVE-2025-59789) that exposes high-performance systems to crash risks, a high-severity unauthenticated XXE vulnerability in GeoServer (CVE-2025-58360) enabling file theft and SSRF, and a critical SQL injection vulnerability in Devolutions Server (CVE-2025-13757) that allows authenticated attackers to steal all stored passwords. Additional disclosures include a proof-of-concept exploit for a Windows Administrator Protection elevation of privilege vulnerability (CVE-2025-60718), a critical boot process compromise in Snapdragon 8 Gen 3 and 5G modems (CVE-2025-47372), and a flaw in Apache Kvrocks that allows privilege escalation via the 'RESET' command. A separate high-severity vulnerability (CVE-2025-61618) was identified in Unisoc T8100/T9100/T8200/T8300 chipsets, affecting Android devices and allowing remote denial of service through improper input validation in the NR modem. These vulnerabilities collectively highlight the ongoing risk posed by both software and hardware flaws, with several enabling remote code execution, privilege escalation, or denial of service. Organizations using affected products should prioritize patching and mitigation efforts to reduce exposure to these critical threats.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.