cobham CVE Vulnerabilities & Metrics

Focus on cobham vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About cobham Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with cobham. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total cobham CVEs: 13
Earliest CVE date: 15 Aug 2014, 11:15 UTC
Latest CVE date: 10 Oct 2019, 20:15 UTC

Latest CVE reference: CVE-2019-9534

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical cobham CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 6.56

Max CVSS: 10.0

Critical CVEs (≥9): 4

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 6
7.0-8.9 6
9.0-10.0 4

CVSS Distribution Chart

Top 5 Highest CVSS cobham CVEs

These are the five CVEs with the highest CVSS scores for cobham, sorted by severity first and recency.

All CVEs for cobham

CVE-2019-9534 cobham vulnerability CVSS: 7.2 10 Oct 2019, 20:15 UTC

The Cobham EXPLORER 710, firmware version 1.07, does not validate its firmware image. Development scripts left in the firmware can be used to upload a custom firmware image that the device runs. This could allow an unauthenticated, local attacker to upload their own firmware that could be used to intercept or modify traffic, spoof or intercept GPS traffic, exfiltrate private data, hide a backdoor, or cause a denial-of-service.

CVE-2019-9533 cobham vulnerability CVSS: 10.0 10 Oct 2019, 20:15 UTC

The root password of the Cobham EXPLORER 710 is the same for all versions of firmware up to and including v1.08. This could allow an attacker to reverse-engineer the password from available versions to gain authenticated access to the device.

CVE-2019-9532 cobham vulnerability CVSS: 2.1 10 Oct 2019, 20:15 UTC

The web application portal of the Cobham EXPLORER 710, firmware version 1.07, sends the login password in cleartext. This could allow an unauthenticated, local attacker to intercept the password and gain access to the portal.

CVE-2019-9531 cobham vulnerability CVSS: 10.0 10 Oct 2019, 20:15 UTC

The web application portal of the Cobham EXPLORER 710, firmware version 1.07, allows unauthenticated access to port 5454. This could allow an unauthenticated, remote attacker to connect to this port via Telnet and execute 86 Attention (AT) commands, including some that provide unauthenticated, shell-like access to the device.

CVE-2019-9530 cobham vulnerability CVSS: 4.9 10 Oct 2019, 20:15 UTC

The web root directory of the Cobham EXPLORER 710, firmware version 1.07, has no access restrictions on downloading and reading all files. This could allow an unauthenticated, local attacker connected to the device to access and download any file found in the web root directory.

CVE-2019-9529 cobham vulnerability CVSS: 4.9 10 Oct 2019, 20:15 UTC

The web application portal of the Cobham EXPLORER 710, firmware version 1.07, has no authentication by default. This could allow an unauthenticated, local attacker connected to the device to access the portal and to make any change to the device.

CVE-2019-16320 cobham vulnerability CVSS: 5.0 15 Sep 2019, 16:15 UTC

Cobham Sea Tel v170 224521 through v194 225444 devices allow attackers to obtain potentially sensitive information, such as a vessel's latitude and longitude, via the public SNMP community.

CVE-2018-19394 cobham vulnerability CVSS: 3.5 15 Mar 2019, 16:29 UTC

Cobham Satcom Sailor 800 and 900 devices contained persistent XSS, which required administrative access to exploit. The vulnerability was exploitable by acquiring a copy of the device's configuration file, inserting an XSS payload into a relevant field (e.g., Satellite name), and then restoring the malicious configuration file.

CVE-2018-19393 cobham vulnerability CVSS: 7.8 15 Mar 2019, 16:29 UTC

Cobham Satcom Sailor 800 and 900 devices contained a vulnerability that allowed for arbitrary writing of content to the system's configuration file. This was exploitable via multiple attack vectors depending on the device's configuration. Further analysis also indicated this vulnerability could be leveraged to achieve a Denial of Service (DoS) condition, where the device would require a factory reset to return to normal operation.

CVE-2018-5728 cobham vulnerability CVSS: 5.0 16 Jan 2018, 23:29 UTC

Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information via a /cgi-bin/getSysStatus request, as demonstrated by the Latitude/Longitude of the ship, or satellite details.

CVE-2018-5267 cobham vulnerability CVSS: 7.5 08 Jan 2018, 03:29 UTC

Cobham Sea Tel 121 build 222701 devices allow remote attackers to bypass authentication via a direct request to MenuDealerGx.html, MenuDealer.html, MenuEuNCGx.html, MenuEuNC.html, MenuSysGx.html, or MenuSys.html.

CVE-2018-5266 cobham vulnerability CVSS: 5.0 08 Jan 2018, 03:29 UTC

Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information about valid usernames by reading the loginName lines at the js/userLogin.js URI. NOTE: default passwords for the standard usernames are listed in the product's documentation: Dealer with password seatel3, SysAdmin with password seatel2, and User with password seatel1.

CVE-2018-5071 cobham vulnerability CVSS: 3.5 08 Jan 2018, 03:29 UTC

Persistent XSS exists in the web server on Cobham Sea Tel 116 build 222429 satellite communication system devices: remote attackers can inject malicious JavaScript code using the device's TELNET shell built-in commands, as demonstrated by the "set ship name" command. This is similar to a Cross Protocol Injection with SNMP.

CVE-2014-2942 cobham vulnerability CVSS: 7.2 22 Sep 2014, 10:55 UTC

Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code.

CVE-2014-2964 cobham vulnerability CVSS: 6.9 15 Aug 2014, 11:15 UTC

Cobham Aviator 700D and 700E satellite terminals have hardcoded passwords for the (1) debug, (2) prod, (3) do160, and (4) flrp programs, which allows physically proximate attackers to gain privileges by sending a password over a serial line.

CVE-2014-2941 cobham vulnerability CVSS: 7.1 15 Aug 2014, 11:15 UTC

Cobham Sailor 6000 satellite terminals have hardcoded Tbus 2 credentials, which allows remote attackers to obtain access via a TBUS2 command. NOTE: the vendor reportedly states "there is no possibility to exploit another user's credentials.

CVE-2014-2940 cobham vulnerability CVSS: 10.0 15 Aug 2014, 11:15 UTC

Cobham Sailor 900 and 6000 satellite terminals with firmware 1.08 MFHF and 2.11 VHF have hardcoded credentials for the administrator account, which allows attackers to obtain administrative control by leveraging physical access or terminal access.

CVE-2014-0328 cobham vulnerability CVSS: 9.3 15 Aug 2014, 11:15 UTC

The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows attackers to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response.

CVE-2013-7180 cobham vulnerability CVSS: 7.8 15 Aug 2014, 11:15 UTC

Cobham SAILOR 900 VSAT; SAILOR FleetBroadBand 150, 250, and 500; EXPLORER BGAN; and AVIATOR 200, 300, 350, and 700D devices do not properly restrict password recovery, which allows attackers to obtain administrative privileges by leveraging physical access or terminal access to spoof a reset code.