VYPR
Critical severity9.8NVD Advisory· Published Jul 22, 2017· Updated May 13, 2026

CVE-2017-3222

CVE-2017-3222

Description

Hard-coded credentials in AmosConnect 8 allow remote attackers to gain full administrative privileges, including the ability to execute commands on the Microsoft Windows host platform with SYSTEM privileges by abusing AmosConnect Task Manager.

Affected products

11
  • cpe:2.3:a:inmarsat:amosconnect:8.0:*:*:*:*:*:*:*+ 9 more
    • cpe:2.3:a:inmarsat:amosconnect:8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:inmarsat:amosconnect:8.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:inmarsat:amosconnect:8.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:inmarsat:amosconnect:8.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:inmarsat:amosconnect:8.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:inmarsat:amosconnect:8.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:inmarsat:amosconnect:8.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:inmarsat:amosconnect:8.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:inmarsat:amosconnect:8.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:inmarsat:amosconnect:8.4.0.1:*:*:*:*:*:*:*
  • Inmarsat/AmosConnectv5
    Range: 8.0, 8.0.1, 8.0.2, 8.2.0, 8.2.1, 8.2.2, 8.3.0, 8.3.1, 8.4.0, 8.4.0.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.