2 results (0.004 seconds)

CVSS: 9.3EPSS: 0%CPEs: 20EXPL: 0

The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to install Trojan horse firmware by leveraging cleartext credentials in a crafted (1) update or (2) reprogramming action. El gateway Sierra Wireless AirLink Raven X EV-DO 4221_0.0.11.003 y 4228_4.0.11.003 permite a atacantes remotos instalar un firmware troyano aprovechando credenciales en texto plano en un (1) update manipulado o (2) acción de reprogramación manipulada. • http://ics-cert.us-cert.gov/advisories/ICSA-14-007-01A http://www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdf • CWE-255: Credentials Management Errors •

CVSS: 10.0EPSS: 0%CPEs: 20EXPL: 0

The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to reprogram the firmware via a replay attack using UDP ports 17336 and 17388. El gateway Sierra Wireless AirLink Raven X EV-DO 4221_4.0.11.003 y 4228_4.0.11.003 permite a atacantes remotos reprogramar el firmware a través de un ataque replay utilizando puertos UDP 17336 y 17388. • http://ics-cert.us-cert.gov/advisories/ICSA-14-007-01A http://www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdf • CWE-287: Improper Authentication •