The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to reprogram the firmware via a replay attack using UDP ports 17336 and 17388.
References
Link | Resource |
---|---|
http://www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdf | Vendor Advisory |
http://ics-cert.us-cert.gov/advisories/ICSA-14-007-01A | US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2014-01-15 08:08
Updated : 2014-01-16 08:47
NVD link : CVE-2013-2820
Mitre link : CVE-2013-2820
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
sierrawireless
- airlink_mp_sprint_wifi
- pinpoint_x
- airlink_mp_at\&t
- airlink_mp_bell
- airlink_mp_at\&t_wifi
- airlink_mp_verizon_wifi
- raven_xe
- raven_x
- raven_xt
- airlink_mp_bell_wifi
- raven_x_ev-do_firmware
- raven_x_ev-do
- pinpoint_xt
- airlink_mp_sprint
- airlink_mp_row_wifi
- airlink_mp_row
- airlink_mp_verizon
- airlink_mp_telus_wifi
- airlink_mp_telus