Adaptive Coding and Modulation (ACM) space protocols are currently being implemented and standardised to maximise data throughput on satellite links in the presence of signal fading and radio interference. These systems use an uplink feedback channel, allowing the ground segment to influence the selection of modulation and coding parameters to suit the current channel conditions. However, no current academic work considers the security implications of physical-layer attackers targeting this uplink channel.In this paper, we introduce the uplink-assisted attacker which hijacks the currently unauthenticated ACM feedback mechanisms, using only cheaply available equipment, to select illsuited communication parameters and prevent the channel from responding to radio interference attacks on the downlink. Our results show the high impact of this attack class: an uplink-assisted noise jammer can cause a 50% frame error rate at 11.5 dB less average power than a noise jammer alone, and up to 16.9 dB if higher modulation and coding parameters are supported. Uplinkassisted spoofing and bandwidth restricting attackers are also shown to be more effective than their counterparts which attack the downlink alone.Unfortunately, these issues cannot be resolved by cryptographic authentication alone, especially where an attacker can pose as one of multiple terminals reporting channel quality. We therefore conclude with a discussion of countermeasures to prevent and detect this form of attack, and draw out lessons learned for secure ACM design.