CVE-2026-29127
Insecure File Permissions in IDC SFX2100 Enable Local Privilege Escalation
Publication date: 2026-03-05
Last updated on: 2026-03-09
Assigner: Gridware
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| datacast | sfx2100_firmware | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the IDC SFX2100 Satellite Receiver involves overly permissive file system permissions set on the monitor user's home directory.
Specifically, the directory is configured with permissions 0777, which means that all local users on the system have read, write, and execute access to it.
Because highly privileged processes and binaries reside within this directory, this misconfiguration may allow local users to escalate their privileges depending on the system conditions.
How can this vulnerability impact me? :
This vulnerability can lead to local privilege escalation, where a user with limited permissions could gain higher privileges on the system.
Such an escalation could allow unauthorized users to execute privileged operations, potentially compromising the security and integrity of the system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves overly permissive file system permissions (0777) on the monitor user's home directory in the IDC SFX2100 Satellite Receiver. To detect this on your system, you can check the permissions of the relevant user's home directory.
- Use the command: ls -ld /home/monitor (replace /home/monitor with the actual path if different) to view the directory permissions.
- Look for permissions showing rwxrwxrwx (0777), which means read, write, and execute access for all users.
- You can also use find to locate directories with 0777 permissions, for example: find /path/to/search -type d -perm 0777
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should immediately restrict the permissions on the monitor user's home directory to prevent all users from having read, write, and execute access.
- Change the directory permissions from 0777 to a more restrictive setting such as 0700 using the command: chmod 700 /home/monitor
- Verify that only the intended user and privileged processes have access to the directory.
- Review and monitor the system for any signs of local privilege escalation attempts.