CVE-2026-29122
Setuid Date Utility in IDC SFX2100 Enables Root File Read Access
Publication date: 2026-03-05
Last updated on: 2026-03-11
Assigner: Gridware
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| datacast | sfx2100_firmware | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'The vulnerability in CVE-2026-29122 involves the International Data Casting (IDC) SFX2100 satellite receiver having the `/bin/date` utility installed with the setuid bit set. This means the `date` command runs with elevated (root) privileges regardless of the user executing it.'}, {'type': 'paragraph', 'content': "An attacker with local access can exploit this by using the `date` command's `-f` option to read arbitrary files on the system with root privileges. Although the file content is altered during processing, this still allows privileged reading of sensitive files such as `/etc/shadow`."}] [1]
How can this vulnerability impact me? :
This vulnerability allows any local user to read sensitive root-owned files on the system without authorization. This can lead to exposure of critical information such as password hashes or configuration secrets.
Such unauthorized access can compromise system security, potentially enabling further attacks like privilege escalation or unauthorized access to confidential data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking if the /bin/date utility on the system has the setuid bit set, which grants it elevated privileges.'}, {'type': 'list_item', 'content': 'Run the command: ls -l /bin/date'}, {'type': 'list_item', 'content': "If the output shows an 's' in the user permission bits (e.g., -rwsr-xr-x), the setuid bit is set."}, {'type': 'paragraph', 'content': 'Additionally, you can test if the date command can read privileged files by attempting to read /etc/shadow using the following command:'}, {'type': 'list_item', 'content': 'sudo /bin/date -f /etc/shadow'}, {'type': 'paragraph', 'content': 'If the command outputs content from /etc/shadow or other root-only files, the vulnerability is present.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include removing the setuid bit from the /bin/date utility to prevent it from running with elevated privileges.
- Run the command: sudo chmod u-s /bin/date
Alternatively, restrict access to the /bin/date binary so that only trusted users can execute it.
Consider applying vendor patches or updates if available that address this vulnerability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know