First published: Mon Dec 04 2023(Updated: )
Several versions of ALEOS, including ALEOS 4.16.0, use a hardcoded SSL certificate and private key. An attacker with access to these items could potentially perform a man in the middle attack between the ACEManager client and ACEManager server.
Credit: security@sierrawireless.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Sierrawireless Aleos | <=4.16.0 | |
Any of | ||
Sierrawireless Es450 | ||
Sierrawireless Gx450 | ||
Sierrawireless Lx40 | ||
Sierrawireless Lx60 | ||
Sierrawireless Mp70 | ||
Sierrawireless Rv50x | ||
Sierrawireless Rv55 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40464 is a vulnerability that allows an attacker to perform a man-in-the-middle attack by using a hardcoded SSL certificate and private key in ALEOS versions up to 4.16.0.
ALEOS versions up to 4.16.0 are affected by CVE-2023-40464.
CVE-2023-40464 has a severity rating of 8.1 (high).
An attacker with access to the hardcoded SSL certificate and private key could perform a man-in-the-middle attack between the ACEManager client and ACEManager server.
To mitigate the risk of CVE-2023-40464, it is recommended to update ALEOS to a version that does not use the hardcoded SSL certificate and private key, or follow the recommendations provided by the vendor.