First published: Mon Dec 25 2023(Updated: )
OpenNDS, as used in Sierra Wireless ALEOS before 4.17.0.12 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference, daemon crash, and Captive Portal outage) via a GET request to /opennds_auth/ that lacks a custom query string parameter and client-token.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Sierra Wireless ALEOS | <4.17.0.12 | |
Any of | ||
Sierra Wireless AirLink LX40 | ||
Sierra Wireless AirLink LX60 | ||
Sierra Wireless AirLink MP70 | ||
Sierra Wireless AirLink RV50X | ||
Sierra Wireless AirLink RV55 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38321 has a high severity as it allows remote attackers to crash the daemon and cause Captive Portal outages.
To fix CVE-2023-38321, upgrade your Sierra Wireless ALEOS to version 4.17.0.12 or later.
CVE-2023-38321 enables denial of service attacks through a NULL pointer dereference caused by a specific GET request.
CVE-2023-38321 affects all versions of Sierra Wireless ALEOS prior to 4.17.0.12.
Sierra Wireless devices utilizing OpenNDS such as ALEOS versions below 4.17.0.12 are affected by CVE-2023-38321.