Plattform
linux
Komponente
sfx2100-satellite-receiver
Behoben in
2100.0.1
CVE-2026-29123 describes a Privilege Escalation vulnerability affecting the IDC SFX2100 Satellite Receiver running on Linux. This vulnerability allows a local attacker to potentially escalate their privileges to root by exploiting a SUID root-owned binary located in /home/xd/terminal/XDTerminal. The vulnerability impacts SFX2100 receivers running versions less than or equal to SFX2100. Due to the lack of a patch, mitigation strategies focus on access control and system hardening.
The primary impact of CVE-2026-29123 is the potential for a local attacker to gain root privileges on the SFX2100 Satellite Receiver. This could allow the attacker to completely compromise the device, including accessing sensitive data, installing malware, and potentially using the device as a pivot point to attack other systems on the network. The vulnerability is exploitable through techniques like PATH hijacking, where an attacker can place a malicious executable earlier in the PATH environment variable, causing the SUID binary to execute it instead. Symlink abuse could allow an attacker to trick the binary into executing a malicious file by creating a symbolic link to it. Shared object hijacking involves replacing a legitimate shared object with a malicious one.
CVE-2026-29123 is not currently listed on the CISA KEV catalog. The EPSS score is pending evaluation. There are no publicly known proof-of-concept exploits available at this time. The vulnerability was disclosed on 2026-03-05.
Systems utilizing the SFX2100 Satellite Receiver in environments with limited access controls are at higher risk. Shared hosting environments or deployments where the receiver is exposed to untrusted networks should be prioritized for mitigation efforts. Legacy configurations with outdated security practices are also particularly vulnerable.
• linux / server:
find /home/xd/terminal -type f -perm +s -user root• linux / server:
journalctl -u XDTerminal | grep -i error• linux / server:
ps aux | grep XDTerminal• linux / server:
ls -l /home/xd/terminal/XDTerminaldisclosure
Exploit-Status
EPSS
0.01% (1% Perzentil)
CISA SSVC
Since a patch is not currently available for CVE-2026-29123, mitigation focuses on reducing the attack surface and limiting the potential impact. The most immediate step is to restrict access to the /home/xd/terminal/XDTerminal directory, ensuring that only authorized users can access it. Implement strict file permissions on the XDTerminal binary itself, ensuring that it can only be executed by the root user. Consider using AppArmor or SELinux to further restrict the binary's capabilities and prevent it from accessing sensitive resources. Regularly audit the system for any suspicious files or modifications in the /home/xd/terminal directory. After implementing these mitigations, verify the effectiveness by attempting to execute the XDTerminal binary as a non-root user and confirming that it fails to escalate privileges.
Aktualisieren Sie die Firmware des Satellitenempfängers SFX2100 auf eine Version, die die Schwachstelle behebt. Wenden Sie sich an International Datacasting Corporation, um die neueste Firmware-Aktualisierung und Installationsanweisungen zu erhalten.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-29123 is a vulnerability in the SFX2100 Satellite Receiver allowing a local attacker to potentially gain root privileges through PATH hijacking, symlink abuse, or shared object hijacking.
You are affected if you are using the SFX2100 Satellite Receiver with versions ≤SFX2100 running on Linux.
A direct patch is not yet available. Mitigate by restricting PATH, file permissions, and using AppArmor/SELinux.
Currently, there are no confirmed reports of active exploitation, but the vulnerability's nature suggests a potential for exploitation.
Refer to the IDC website or security mailing lists for the official advisory regarding CVE-2026-29123.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.