First published: Wed Jan 15 2014(Updated: )
The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to reprogram the firmware via a replay attack using UDP ports 17336 and 17388.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Sierra Wireless Raven X EV-DO Firmware | =4221_4.0.11.003 | |
Sierra Wireless Raven X EV-DO Firmware | =4228_4.0.11.003 | |
Sierra Wireless AirLink MP AT&T | ||
Sierra Wireless Airlink MP AT&T | ||
Sierra Wireless AirLink MP Bell | ||
Sierra Wireless AirLink MP | ||
Sierra Wireless Airlink MP Row | ||
Sierra Wireless AirLink MP Series | ||
Sierra Wireless AirLink MP Sprint | ||
Sierra Wireless AirLink MP Sprint | ||
Sierra Wireless AirLink MP Telus | ||
Sierra Wireless AirLink MP | ||
Sierra Wireless Airlink MP Verizon Wifi | ||
Sierra Wireless Airlink MP Verizon Wifi | ||
Sierra Wireless Pinpoint X | ||
Sierra Wireless Pinpoint Xt | ||
Sierra Wireless Raven X | ||
Sierra Wireless Raven X EV-DO | ||
Sierra Wireless Airlink Raven Xe Firmware | ||
Sierra Wireless Airlink Raven Xt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2820 is classified as a critical vulnerability due to the potential for remote attackers to reprogram the firmware.
To fix CVE-2013-2820, update the firmware of the affected Sierra Wireless AirLink Raven X devices to the latest version provided by the vendor.
CVE-2013-2820 affects Sierra Wireless AirLink Raven X models with firmware versions 4221_4.0.11.003 and 4228_4.0.11.003.
Yes, CVE-2013-2820 can be exploited remotely through specific UDP ports used by the affected devices.
CVE-2013-2820 involves a replay attack that allows unauthorized firmware changes in the vulnerable devices.