Sierra Wireless ALEOS before 4.4.2 on AirLink ES, GX, and LS devices has hardcoded root accounts, which makes it easier for remote attackers to obtain administrative access via a (1) SSH or (2) TELNET session.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/628568 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/628568 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/628568 - Third Party Advisory, US Government Resource |
Information
Published : 2015-08-08 01:59
Updated : 2024-11-21 02:28
NVD link : CVE-2015-2897
Mitre link : CVE-2015-2897
CVE.ORG link : CVE-2015-2897
JSON object : View
Products Affected
sierrawireless
- airlink_gx440
- airlink_gx450
- aleos
- airlink_es450
- airlink_ls300
- airlink_es440
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor