← Back to CVEs
CVE-2017-3222
CRITICAL9.8
Description
Hard-coded credentials in AmosConnect 8 allow remote attackers to gain full administrative privileges, including the ability to execute commands on the Microsoft Windows host platform with SYSTEM privileges by abusing AmosConnect Task Manager.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published7/22/2017
Last Modified4/20/2025
Sourcenvd
Honeypot Sightings0
Affected Products
inmarsat:amosconnect
Weaknesses (CWE)
CWE-798CWE-798
References
http://www.securityfocus.com/bid/99899(cret@cert.org)
https://twitter.com/mkolsek/status/923988845783322625(cret@cert.org)
https://www.kb.cert.org/vuls/id/586501(cret@cert.org)
http://www.inmarsat.com/news/inmarsat-response-to-ioactive-claims/(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/99899(af854a3a-2127-422b-91ae-364da2661108)
https://twitter.com/mkolsek/status/923988845783322625(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/586501(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.