First published: Mon May 06 2019(Updated: )
A hard-coded credentials vulnerability exists in the snmpd function of the Sierra Wireless AirLink ES450 FW 4.9.3. Activating snmpd outside of the WebUI can cause the activation of the hard-coded credentials, resulting in the exposure of a privileged user. An attacker can activate snmpd without any configuration changes to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sierrawireless Airlink Es450 Firmware | =4.9.3 | |
Sierrawireless Airlink Es450 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4062 is a hard-coded credentials vulnerability in the snmpd function of the Sierra Wireless AirLink ES450 FW 4.9.3.
Activating snmpd outside of the WebUI can cause the activation of the hard-coded credentials, resulting in the exposure of a privileged user.
CVE-2018-4062 has a severity rating of 8.1 (critical).
The Sierra Wireless AirLink ES450 FW 4.9.3 is affected by the hard-coded credentials vulnerability.
Yes, you can find more information about CVE-2018-4062 at the following references: [1] [2] [3]