Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Cisco Finds Serious Flaws in Sierra Wireless AirLink Devices

Cisco’s Talos research and intelligence group on Thursday disclosed the details of nearly a dozen vulnerabilities uncovered in Sierra Wireless AirLink devices, including serious flaws that can be exploited to change system settings, execute arbitrary code, and modify passwords.

Cisco’s Talos research and intelligence group on Thursday disclosed the details of nearly a dozen vulnerabilities uncovered in Sierra Wireless AirLink devices, including serious flaws that can be exploited to change system settings, execute arbitrary code, and modify passwords.

The security holes impact several Sierra Wireless AirLink gateways and routers, which are typically used by enterprises to connect industrial equipment, point-of-sale (PoS) systems, cameras, smart devices, sensors, and various types of business-critical devices.

Sierra Wireless AirLink vulnerabilitiesTalos identified the flaws in AirLink ES450 LTE enterprise gateways running firmware version 4.9.3. However, the vendor has confirmed that some of the weaknesses also impact GX400, GX450 and LS300 rugged cellular gateways; MP70 vehicle routers; RV50/RV50X industrial gateways; and LX40/60X compact routers for IoT and M2M applications.

A majority of the flaws uncovered by Talos exist in ACEManager, the web server component present in these devices.

Three of the security holes have been classified as “critical” with a CVSS score of 9.9. They can be exploited by an attacker to make changes to any system settings and execute arbitrary commands and code. The vulnerabilities can be exploited by an authenticated attacker by sending specially crafted HTTP requests to the targeted device.

Learn More About Flaws in Industrial Products at SecurityWeek’s 2019 ICS Cyber Security Conference

Three of the flaws have been rated “high severity.” These allow an authenticated attacker to change the user password and obtain plaintext passwords and other sensitive information. One of these issues, the only one that is not related to the ACEManager web server, impacts the SNMPD component and it can be exploited to activate hardcoded credentials on a device.

The rest of the vulnerabilities have been classified as “medium severity” and they include cross-site scripting (XSS), cross-site request forgery (CSRF), and information disclosure issues.

Talos said it had worked with Sierra Wireless to ensure that patches are developed, but the vendor has yet to release a public advisory for these flaws so it’s unclear which firmware updates address them.

Related: Unpatched Flaws Plague Sierra Wireless Industrial Gateways

Related: Sierra Wireless Rugged Gateways Targeted by Mirai Malware

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...