Now on Demand: Threat Detection and Incident Response (TDIR) Summit - All Sessions Available
Connect with us

Hi, what are you looking for?



Unpatched Flaws Plague Sierra Wireless Industrial Gateways

A researcher has discovered several vulnerabilities in Sierra Wireless industrial gateways, but the vendor will not address the issues because the products are approaching end of life.

A researcher has discovered several vulnerabilities in Sierra Wireless industrial gateways, but the vendor will not address the issues because the products are approaching end of life.

Security researcher Karn Ganeshen reported recently that Sierra Wireless AirLink Raven XE and XT modems are affected by several flaws. One of the issues is related to the existence of a default account that allows an attacker with access to the network to log in to the device’s web administration interface.

Ganeshen said he identified at least one device that can be accessed directly from the Internet through this vulnerability because it has port forwarding enabled. The expert believes the vendor should have forced users to change the password for this account.

Another vulnerability found by the researcher is related to the lack of anti-CSRF tokens in AceManager, a browser-based gateway management application used for Sierra’s AirLink products. The security hole allows an attacker to perform arbitrary actions if they can trick an authenticated user into clicking on a malicious link.

Ganeshen also discovered that the GET requests used by AceManager leak sensitive information, including credentials. The expert also identified several webpages that can be accessed without authentication, including ones that allow users to reboot the device and upload arbitrary files.

The affected products are deployed in various industries around the world, but the issues will not be patched because AirLink Raven XE and XT gateways will only be sold until August 31. The vendor recommends replacing them with the newer AirLink Raven RV50.

In the meantime, ICS-CERT says users have been advised to apply a series of mitigations to protect the devices against potential attacks. This includes changing default passwords, using firewalls and physical security solutions to protect devices from unauthorized access, disabling port forwarding, not accessing AceManager from Internet-connected devices, and disabling AceManager access via the cellular WAN interface.

Earlier this year, ICS-CERT published an advisory describing a medium severity file and directory information disclosure vulnerability in AceManager. The flaw, discovered by researcher Maxim Rupp, affected several AirLink gateway models.

Advertisement. Scroll to continue reading.

Related: Meteocontrol Patches Flaws in Photovoltaic Data Logger

Related: Unpatched Flaws Plague Moxa Connectivity Products

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.


People on the Move

Wendy Zheng named as CFO and Joe Diamond as CMO at cyber asset management firm Axonius.

Intelligent document processing company ABBYY has hired Clayton C. Peddy as CISO.

Digital executive protection services provider BlackCloak has appointed Ryan Black as CISO.

More People On The Move

Expert Insights