Critical severity9.8NVD Advisory· Published Jul 22, 2017· Updated May 13, 2026
CVE-2017-3222
CVE-2017-3222
Description
Hard-coded credentials in AmosConnect 8 allow remote attackers to gain full administrative privileges, including the ability to execute commands on the Microsoft Windows host platform with SYSTEM privileges by abusing AmosConnect Task Manager.
Affected products
11cpe:2.3:a:inmarsat:amosconnect:8.0:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:a:inmarsat:amosconnect:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:inmarsat:amosconnect:8.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:inmarsat:amosconnect:8.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:inmarsat:amosconnect:8.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:inmarsat:amosconnect:8.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:inmarsat:amosconnect:8.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:inmarsat:amosconnect:8.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:inmarsat:amosconnect:8.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:inmarsat:amosconnect:8.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:inmarsat:amosconnect:8.4.0.1:*:*:*:*:*:*:*
- Inmarsat/AmosConnectv5Range: 8.0, 8.0.1, 8.0.2, 8.2.0, 8.2.1, 8.2.2, 8.3.0, 8.3.1, 8.4.0, 8.4.0.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.inmarsat.com/news/inmarsat-response-to-ioactive-claims/nvdVendor Advisory
- www.securityfocus.com/bid/99899nvdThird Party AdvisoryVDB Entry
- twitter.com/mkolsek/status/923988845783322625nvdThird Party Advisory
- www.kb.cert.org/vuls/id/586501nvdThird Party AdvisoryUS Government Resource
News mentions
0No linked articles in our index yet.