First published: Wed Jan 15 2014(Updated: )
The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to install Trojan horse firmware by leveraging cleartext credentials in a crafted (1) update or (2) reprogramming action.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Sierrawireless Raven X Ev-do Firmware | =4221_4.0.11.003 | |
Sierrawireless Raven X Ev-do Firmware | =4228_4.0.11.003 | |
Sierrawireless Airlink Mp At\&t | ||
Sierrawireless Airlink Mp At\&t Wifi | ||
Sierrawireless Airlink Mp Bell | ||
Sierrawireless Airlink Mp Bell Wifi | ||
Sierrawireless Airlink Mp Row | ||
Sierrawireless Airlink Mp Row Wifi | ||
Sierrawireless Airlink Mp Sprint | ||
Sierrawireless Airlink Mp Sprint Wifi | ||
Sierrawireless Airlink Mp Telus | ||
Sierrawireless Airlink Mp Telus Wifi | ||
Sierrawireless Airlink Mp Verizon | ||
Sierrawireless Airlink Mp Verizon Wifi | ||
Sierrawireless Pinpoint X | ||
Sierrawireless Pinpoint Xt | ||
Sierrawireless Raven X | ||
Sierrawireless Raven X Ev-do | ||
Sierrawireless Raven Xe | ||
Sierrawireless Raven Xt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.