Overview
Sierra Wireless GX, ES, and LS gateway devices running ALEOS versions 4.4.1 and earlier contain hard-coded credentials.
Description
CWE-259: Use of Hard-coded Password - CVE-2015-2897 Sierra Wireless GX, ES, and LS gateways running ALEOS contain multiple hard-coded accounts with root privileges. These accounts are enabled by default and accessible by telnet or SSH in systems using ALEOS 4.3.4 or earlier. The accounts also exist and are enabled in versions 4.3.5 to 4.4.1, though remote access is disabled by default. |
Impact
A remote, unauthenticated attacker may be able to gain full control of an affected device. |
Solution
Apply an update |
Restrict access |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 8.3 | E:F/RL:OF/RC:C |
Environmental | 6.7 | CDP:MH/TD:M/CR:ND/IR:H/AR:ND |
References
- http://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---cve-2015-2897/
- http://source.sierrawireless.com/resources/airlink/software_reference_docs/release-notes/aleos-4,-d-,4,-d-,2-release-notes/
- http://cwe.mitre.org/data/definitions/259.html
Acknowledgements
Thanks to the reporter who wishes to remain anonymous.
This document was written by Joel Land.
Other Information
CVE IDs: | CVE-2015-2897 |
Date Public: | 2015-08-07 |
Date First Published: | 2015-08-07 |
Date Last Updated: | 2015-08-10 20:56 UTC |
Document Revision: | 42 |