- Date Discovered:
- 09 October 2019
- Cobham EXPLORER 710 is prone to multiple security vulnerabilities: 1. Multiple security weaknesses 2. Multiple access-bypass vulnerabilities 3. An information-disclosure vulnerability 4. An arbitrary file upload vulnerability An attacker may exploit these issues to perform certain unauthorized actions and gain access to the affected application, bypass security restrictions, upload arbitrary files and disclose sensitive information.
- Cobham EXPLORER 710 1.07
- Cobham EXPLORER 710 1.08
Block external access at the network boundary, unless external parties require service.If global access isn't needed, filter access to the affected computer at the network boundary. Restricting access to only trusted computers and networks might greatly reduce the likelihood of successful exploits.
Run all software as a nonprivileged user with minimal access rights.To reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.
Do not follow links provided by unknown or untrusted sources.Web users should be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.
Kyle O'Meara and David Belasco of the CERT Coordination Center