First published: Sat Aug 08 2015(Updated: )
Sierra Wireless ALEOS before 4.4.2 on AirLink ES, GX, and LS devices has hardcoded root accounts, which makes it easier for remote attackers to obtain administrative access via a (1) SSH or (2) TELNET session.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sierra Wireless ALEOS | <=4.4.1 | |
Sierra Wireless AirLink ES440 | ||
Sierra Wireless AirLink ES450 | ||
Sierra Wireless GX440 | ||
Sierra Wireless AirLink GX450 | ||
Sierra Wireless AirLink LS300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2897 is considered a high severity vulnerability due to the presence of hardcoded root accounts that pose a significant security risk.
To fix CVE-2015-2897, update your Sierra Wireless ALEOS software to version 4.4.2 or later.
CVE-2015-2897 affects Sierra Wireless ALEOS versions prior to 4.4.2 on AirLink ES, GX, and LS devices.
CVE-2015-2897 can be exploited through SSH and TELNET protocols.
CVE-2015-2897 allows remote attackers to gain unauthorized administrative access to the affected devices.