First published: Mon Feb 23 2015(Updated: )
CRLF injection vulnerability in export.cfg in the web-based administrative console for Sierra Wireless AirCard 760S, 762S, and 763S allows remote attackers to inject arbitrary headers via CRLF sequences in the save parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sierra Wireless Sierra Wireless Aircard 760s | ||
Sierra Wireless Sierra Wireless Aircard 762s | ||
Sierra Wireless Sierra Wireless Aircard 763s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2054 is considered a medium-severity vulnerability due to the potential for remote header injection.
To fix CVE-2015-2054, apply any available firmware updates for the Sierra Wireless AirCard 760S, 762S, and 763S models.
CVE-2015-2054 affects users of the Sierra Wireless AirCard 760S, 762S, and 763S devices.
CVE-2015-2054 can enable remote attackers to perform HTTP response splitting attacks through header injection.
Yes, CVE-2015-2054 can be exploited easily by attackers who can send crafted requests to the affected devices.