First published: Mon Dec 26 2022(Updated: )
The ACENet service in Sierra Wireless ALEOS before 4.4.9, 4.5.x through 4.9.x before 4.9.5, and 4.10.x through 4.13.x before 4.14.0 allows remote attackers to execute arbitrary code via a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sierrawireless Aleos | >=4.10.0<4.14.0 | |
Sierrawireless Lx40 | ||
Sierrawireless Lx60 | ||
Sierrawireless Mp70 | ||
Sierrawireless Mp70e | ||
Sierrawireless Rv50 | ||
Sierrawireless Rv50x | ||
Sierrawireless Aleos | >=4.9.0<4.9.5 | |
Sierrawireless Es450 | ||
Sierrawireless Gx450 | ||
Sierrawireless Aleos | <4.4.9 | |
Sierrawireless Es440 | ||
Sierrawireless Gx400 | ||
Sierrawireless Gx440 | ||
Sierrawireless Ls300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-11851.
The severity of CVE-2019-11851 is critical with a severity value of 9.8.
The affected software for CVE-2019-11851 is Sierra Wireless ALEOS versions before 4.4.9, 4.5.x through 4.9.x before 4.9.5, and 4.10.x through 4.13.x before 4.14.0.
Remote attackers can exploit CVE-2019-11851 through a buffer overflow to execute arbitrary code.
You can find more information about CVE-2019-11851 in the Sierra Wireless security bulletin and on the Sierra Wireless company security page.