The ACENet service in Sierra Wireless ALEOS before 4.4.9, 4.5.x through 4.9.x before 4.9.5, and 4.10.x through 4.13.x before 4.14.0 allows remote attackers to execute arbitrary code via a buffer overflow.
References
Link | Resource |
---|---|
http://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2021-001.ashx | Vendor Advisory |
https://www.sierrawireless.com/company/security/ | Vendor Advisory |
http://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2021-001.ashx | Vendor Advisory |
https://www.sierrawireless.com/company/security/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2021-001.ashx - Vendor Advisory | |
References | () https://www.sierrawireless.com/company/security/ - Vendor Advisory |
Information
Published : 2022-12-26 22:15
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11851
Mitre link : CVE-2019-11851
CVE.ORG link : CVE-2019-11851
JSON object : View
Products Affected
sierrawireless
- ls300
- gx400
- gx450
- mp70e
- aleos
- gx440
- rv50
- rv50x
- lx60
- lx40
- es440
- es450
- mp70
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')