// For flags

CVE-2017-15043

 

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in Sierra Wireless AirLink GX400, GX440, ES440, and LS300 routers with firmware before 4.4.5 and GX450, ES450, RV50, RV50X, MP70, and MP70E routers with firmware before 4.9 could allow an authenticated remote attacker to execute arbitrary code and gain full control of an affected system, including issuing commands with root privileges. This vulnerability is due to insufficient input validation on user-controlled input in an HTTP request to the targeted device. An attacker in possession of router login credentials could exploit this vulnerability by sending a crafted HTTP request to an affected system.

Una vulnerabilidad en los routers Sierra Wireless AirLink GX400, GX440, ES440 y LS300 con firmware en versiones anteriores a la 4.4.5 y los routers GX450, ES450, RV50, RV50X, MP70 y MP70E con firmware en versiones anteriores a la 4.9 podría permitir que un atacante remoto autenticado ejecute código arbitrario y obtenga el control total de un sistema afectado, incluyendo el envío de comandos con privilegios root. La vulnerabilidad se debe a la validación de entradas insuficiente en las entradas controladas por el usuario en una petición HTTP al dispositivo objetivo. Un atacante en posesión de credenciales de inicio de sesión en el router podría explotar esta vulnerabilidad mediante el envío de una petición HTTP manipulada a un sistema afectado.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-10-05 CVE Reserved
  • 2018-05-04 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-08-07 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sierrawireless
Search vendor "Sierrawireless"
Gx440 Firmware
Search vendor "Sierrawireless" for product "Gx440 Firmware"
< 4.4.5
Search vendor "Sierrawireless" for product "Gx440 Firmware" and version " < 4.4.5"
-
Affected
in Sierrawireless
Search vendor "Sierrawireless"
Gx440
Search vendor "Sierrawireless" for product "Gx440"
--
Safe
Sierrawireless
Search vendor "Sierrawireless"
Es440 Firmware
Search vendor "Sierrawireless" for product "Es440 Firmware"
< 4.4.5
Search vendor "Sierrawireless" for product "Es440 Firmware" and version " < 4.4.5"
-
Affected
in Sierrawireless
Search vendor "Sierrawireless"
Es440
Search vendor "Sierrawireless" for product "Es440"
--
Safe
Sierrawireless
Search vendor "Sierrawireless"
Ls300 Firmware
Search vendor "Sierrawireless" for product "Ls300 Firmware"
< 4.4.5
Search vendor "Sierrawireless" for product "Ls300 Firmware" and version " < 4.4.5"
-
Affected
in Sierrawireless
Search vendor "Sierrawireless"
Ls300
Search vendor "Sierrawireless" for product "Ls300"
--
Safe
Sierrawireless
Search vendor "Sierrawireless"
Gx400 Firmware
Search vendor "Sierrawireless" for product "Gx400 Firmware"
< 4.4.5
Search vendor "Sierrawireless" for product "Gx400 Firmware" and version " < 4.4.5"
-
Affected
in Sierrawireless
Search vendor "Sierrawireless"
Gx400
Search vendor "Sierrawireless" for product "Gx400"
--
Safe
Sierrawireless
Search vendor "Sierrawireless"
Es450 Firmware
Search vendor "Sierrawireless" for product "Es450 Firmware"
< 4.9
Search vendor "Sierrawireless" for product "Es450 Firmware" and version " < 4.9"
-
Affected
in Sierrawireless
Search vendor "Sierrawireless"
Es450
Search vendor "Sierrawireless" for product "Es450"
--
Safe
Sierrawireless
Search vendor "Sierrawireless"
Rv50 Firmware
Search vendor "Sierrawireless" for product "Rv50 Firmware"
< 4.9
Search vendor "Sierrawireless" for product "Rv50 Firmware" and version " < 4.9"
-
Affected
in Sierrawireless
Search vendor "Sierrawireless"
Rv50
Search vendor "Sierrawireless" for product "Rv50"
--
Safe
Sierrawireless
Search vendor "Sierrawireless"
Rv50x Firmware
Search vendor "Sierrawireless" for product "Rv50x Firmware"
< 4.9
Search vendor "Sierrawireless" for product "Rv50x Firmware" and version " < 4.9"
-
Affected
in Sierrawireless
Search vendor "Sierrawireless"
Rv50x
Search vendor "Sierrawireless" for product "Rv50x"
--
Safe
Sierrawireless
Search vendor "Sierrawireless"
Mp70 Firmware
Search vendor "Sierrawireless" for product "Mp70 Firmware"
< 4.9
Search vendor "Sierrawireless" for product "Mp70 Firmware" and version " < 4.9"
-
Affected
in Sierrawireless
Search vendor "Sierrawireless"
Mp70
Search vendor "Sierrawireless" for product "Mp70"
--
Safe
Sierrawireless
Search vendor "Sierrawireless"
Mp70e Firmware
Search vendor "Sierrawireless" for product "Mp70e Firmware"
< 4.9
Search vendor "Sierrawireless" for product "Mp70e Firmware" and version " < 4.9"
-
Affected
in Sierrawireless
Search vendor "Sierrawireless"
Mp70e
Search vendor "Sierrawireless" for product "Mp70e"
--
Safe
Sierrawireless
Search vendor "Sierrawireless"
Gx450 Firmware
Search vendor "Sierrawireless" for product "Gx450 Firmware"
< 4.9
Search vendor "Sierrawireless" for product "Gx450 Firmware" and version " < 4.9"
-
Affected
in Sierrawireless
Search vendor "Sierrawireless"
Gx450
Search vendor "Sierrawireless" for product "Gx450"
--
Safe