The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to install Trojan horse firmware by leveraging cleartext credentials in a crafted (1) update or (2) reprogramming action.
References
Link | Resource |
---|---|
http://ics-cert.us-cert.gov/advisories/ICSA-14-007-01A | US Government Resource |
http://www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2014-01-15 16:08
Updated : 2024-02-28 12:00
NVD link : CVE-2013-2819
Mitre link : CVE-2013-2819
CVE.ORG link : CVE-2013-2819
JSON object : View
Products Affected
sierrawireless
- airlink_mp_row_wifi
- airlink_mp_telus
- airlink_mp_row
- airlink_mp_bell_wifi
- raven_xe
- raven_xt
- pinpoint_xt
- pinpoint_x
- raven_x_ev-do
- airlink_mp_sprint
- airlink_mp_telus_wifi
- airlink_mp_sprint_wifi
- raven_x
- airlink_mp_bell
- airlink_mp_at\&t
- airlink_mp_at\&t_wifi
- airlink_mp_verizon_wifi
- airlink_mp_verizon
- raven_x_ev-do_firmware
CWE
CWE-255
Credentials Management Errors