CVE-2015-2897

Sierra Wireless ALEOS before 4.4.2 on AirLink ES, GX, and LS devices has hardcoded root accounts, which makes it easier for remote attackers to obtain administrative access via a (1) SSH or (2) TELNET session.
References
Link Resource
http://www.kb.cert.org/vuls/id/628568 Third Party Advisory US Government Resource
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:sierrawireless:aleos:*:*:*:*:*:*:*:*
OR cpe:2.3:h:sierrawireless:airlink_es450:*:*:*:*:*:*:*:*
cpe:2.3:h:sierrawireless:airlink_gx450:*:*:*:*:*:*:*:*
cpe:2.3:h:sierrawireless:airlink_es440:*:*:*:*:*:*:*:*
cpe:2.3:h:sierrawireless:airlink_gx440:*:*:*:*:*:*:*:*
cpe:2.3:h:sierrawireless:airlink_ls300:*:*:*:*:*:*:*:*

Information

Published : 2015-08-07 18:59

Updated : 2015-08-11 11:10


NVD link : CVE-2015-2897

Mitre link : CVE-2015-2897


JSON object : View

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

Advertisement

dedicated server usa

Products Affected

sierrawireless

  • aleos
  • airlink_es450
  • airlink_es440
  • airlink_gx440
  • airlink_gx450
  • airlink_ls300