CVE-2015-2897

Sierra Wireless ALEOS before 4.4.2 on AirLink ES, GX, and LS devices has hardcoded root accounts, which makes it easier for remote attackers to obtain administrative access via a (1) SSH or (2) TELNET session.
References
Link Resource
http://www.kb.cert.org/vuls/id/628568 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/628568 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:sierrawireless:aleos:*:*:*:*:*:*:*:*
OR cpe:2.3:h:sierrawireless:airlink_es440:*:*:*:*:*:*:*:*
cpe:2.3:h:sierrawireless:airlink_es450:*:*:*:*:*:*:*:*
cpe:2.3:h:sierrawireless:airlink_gx440:*:*:*:*:*:*:*:*
cpe:2.3:h:sierrawireless:airlink_gx450:*:*:*:*:*:*:*:*
cpe:2.3:h:sierrawireless:airlink_ls300:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:28

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/628568 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/628568 - Third Party Advisory, US Government Resource

Information

Published : 2015-08-08 01:59

Updated : 2024-11-21 02:28


NVD link : CVE-2015-2897

Mitre link : CVE-2015-2897

CVE.ORG link : CVE-2015-2897


JSON object : View

Products Affected

sierrawireless

  • airlink_gx440
  • airlink_gx450
  • aleos
  • airlink_es450
  • airlink_ls300
  • airlink_es440
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor