CVE-2026-28776
Published: 04 March 2026
Description
International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver contains hardcoded credentials for the `monitor` account. A remote unauthenticated attacker can use these trivial, undocumented credentials to access the system via SSH. While initially dropped into a restricted shell, the attacker…
more
can trivially break out to achieve standard shell functionality.
Mitigating Controls (NIST 800-53 r5)AI
Directly prohibits the use of hardcoded or default credentials, addressing the root cause of the CVE's trivial undocumented monitor account credentials.
Requires creation, management, disabling, and removal of accounts to eliminate or secure unnecessary accounts like the vulnerable hardcoded monitor account.
Enforces least privilege to restrict functionality in the initial restricted shell, mitigating the trivial breakout to full shell access.
Security SummaryAI
CVE-2026-28776 is a critical vulnerability in the International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver, stemming from hardcoded credentials for the `monitor` account. Published on 2026-03-04, this issue falls under CWE-798 (Use of Hard-coded Credentials) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its severe potential impact.
A remote unauthenticated attacker can exploit the vulnerability by using the trivial, undocumented credentials to access the device via SSH. Upon login, the attacker lands in a restricted shell but can trivially break out to obtain standard shell functionality, enabling full control over the system.
Details on the vulnerability, including analysis of the SFX Series such as the SFX2100 model, are provided in the reference advisory at https://www.abdulmhsblog.com/posts/sfx2100-vulns/.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hardcoded credentials enable use of default accounts (T1078.001) for initial access via external remote service SSH (T1133); trivial restricted shell breakout facilitates privilege escalation (T1068).