First published: Wed Jan 15 2014(Updated: )
The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to install Trojan horse firmware by leveraging cleartext credentials in a crafted (1) update or (2) reprogramming action.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Sierra Wireless Raven X EV-DO Firmware | =4221_4.0.11.003 | |
Sierra Wireless Raven X EV-DO Firmware | =4228_4.0.11.003 | |
Sierra Wireless AirLink MP AT&T | ||
Sierra Wireless Airlink MP AT&T | ||
Sierra Wireless AirLink MP Bell | ||
Sierra Wireless AirLink MP | ||
Sierra Wireless Airlink MP Row | ||
Sierra Wireless AirLink MP Series | ||
Sierra Wireless AirLink MP Sprint | ||
Sierra Wireless AirLink MP Sprint | ||
Sierra Wireless AirLink MP Telus | ||
Sierra Wireless AirLink MP | ||
Sierra Wireless Airlink MP Verizon Wifi | ||
Sierra Wireless Airlink MP Verizon Wifi | ||
Sierra Wireless Pinpoint X | ||
Sierra Wireless Pinpoint Xt | ||
Sierra Wireless Raven X | ||
Sierra Wireless Raven X EV-DO | ||
Sierra Wireless Airlink Raven Xe Firmware | ||
Sierra Wireless Airlink Raven Xt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2819 is considered to have a high severity rating due to the potential for unauthorized firmware installation.
To fix CVE-2013-2819, update your Sierra Wireless AirLink Raven X EV-DO gateway to the latest firmware version that addresses this vulnerability.
CVE-2013-2819 allows remote attackers to leverage cleartext credentials to install malicious firmware on affected devices.
CVE-2013-2819 affects the Sierra Wireless AirLink Raven X EV-DO gateway firmware versions 4221_4.0.11.003 and 4228_4.0.11.003.
Users of the Sierra Wireless AirLink Raven X EV-DO gateways that have not updated their firmware are at risk due to CVE-2013-2819.