ICS/OT

Cisco Finds Serious Flaws in Sierra Wireless AirLink Devices

Cisco’s Talos research and intelligence group on Thursday disclosed the details of nearly a dozen vulnerabilities uncovered in Sierra Wireless AirLink devices, including serious flaws that can be exploited to change system settings, execute arbitrary code, and modify passwords.

<p><strong><span><span>Cisco’s Talos research and intelligence group on Thursday disclosed the details of nearly a dozen vulnerabilities uncovered in Sierra Wireless AirLink devices, including serious flaws that can be exploited to change system settings, execute arbitrary code, and modify passwords.</span></span></strong></p>

Cisco’s Talos research and intelligence group on Thursday disclosed the details of nearly a dozen vulnerabilities uncovered in Sierra Wireless AirLink devices, including serious flaws that can be exploited to change system settings, execute arbitrary code, and modify passwords.

The security holes impact several Sierra Wireless AirLink gateways and routers, which are typically used by enterprises to connect industrial equipment, point-of-sale (PoS) systems, cameras, smart devices, sensors, and various types of business-critical devices.

Talos identified the flaws in AirLink ES450 LTE enterprise gateways running firmware version 4.9.3. However, the vendor has confirmed that some of the weaknesses also impact GX400, GX450 and LS300 rugged cellular gateways; MP70 vehicle routers; RV50/RV50X industrial gateways; and LX40/60X compact routers for IoT and M2M applications.

A majority of the flaws uncovered by Talos exist in ACEManager, the web server component present in these devices.

Three of the security holes have been classified as “critical” with a CVSS score of 9.9. They can be exploited by an attacker to make changes to any system settings and execute arbitrary commands and code. The vulnerabilities can be exploited by an authenticated attacker by sending specially crafted HTTP requests to the targeted device.

Learn More About Flaws in Industrial Products at SecurityWeek’s 2019 ICS Cyber Security Conference

Three of the flaws have been rated “high severity.” These allow an authenticated attacker to change the user password and obtain plaintext passwords and other sensitive information. One of these issues, the only one that is not related to the ACEManager web server, impacts the SNMPD component and it can be exploited to activate hardcoded credentials on a device.

The rest of the vulnerabilities have been classified as “medium severity” and they include cross-site scripting (XSS), cross-site request forgery (CSRF), and information disclosure issues.

Talos said it had worked with Sierra Wireless to ensure that patches are developed, but the vendor has yet to release a public advisory for these flaws so it’s unclear which firmware updates address them.

Advertisement. Scroll to continue reading.

Related: Unpatched Flaws Plague Sierra Wireless Industrial Gateways

Related: Sierra Wireless Rugged Gateways Targeted by Mirai Malware

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version