First published: Mon Dec 04 2023(Updated: )
When configured in debugging mode by an authenticated user with administrative privileges, ALEOS 4.16 and earlier store the SHA512 hash of the common root password for that version in a directory accessible to a user with root privileges or equivalent access.
Credit: security@sierrawireless.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Sierrawireless Aleos | <=4.16.0 | |
Any of | ||
Sierrawireless Es450 | ||
Sierrawireless Gx450 | ||
Sierrawireless Lx40 | ||
Sierrawireless Lx60 | ||
Sierrawireless Mp70 | ||
Sierrawireless Rv50x | ||
Sierrawireless Rv55 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40463 is a vulnerability that allows an authenticated user to access a directory containing the SHA512 hash of the common root password for ALEOS 4.16 and earlier versions.
CVE-2023-40463 has a severity rating of 8.1 (High).
ALEOS 4.16 and earlier versions are affected by CVE-2023-40463.
An authenticated user with administrative privileges can enable debugging mode to access the directory containing the hashed root password.
No, Sierrawireless Es450, Gx450, Lx40, Lx60, Mp70, Rv50x, and Rv55 are not vulnerable to CVE-2023-40463.