Vulnerability Note VU#628568

Sierra Wireless GX, ES, and LS gateways running ALEOS contain hard-coded credentials

Original Release date: 07 Aug 2015 | Last revised: 10 Aug 2015


Sierra Wireless GX, ES, and LS gateway devices running ALEOS versions 4.4.1 and earlier contain hard-coded credentials.


CWE-259: Use of Hard-coded Password - CVE-2015-2897

Sierra Wireless GX, ES, and LS gateways running ALEOS contain multiple hard-coded accounts with root privileges. These accounts are enabled by default and accessible by telnet or SSH in systems using ALEOS 4.3.4 or earlier. The accounts also exist and are enabled in versions 4.3.5 to 4.4.1, though remote access is disabled by default.


A remote, unauthenticated attacker may be able to gain full control of an affected device.


Apply an update

Sierra Wireless has released version 4.4.2 to address this issue by disabling access to the hard-coded accounts by default. Users unable or unwilling to update may also consider the following workaround.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from using credentials from a blocked network location. Refer to the Sierra Wireless technical bulletin for more information about restricting access.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Sierra WirelessAffected17 Jul 201503 Aug 2015
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 10.0 AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal 8.3 E:F/RL:OF/RC:C
Environmental 6.7 CDP:MH/TD:M/CR:ND/IR:H/AR:ND



Thanks to the reporter who wishes to remain anonymous.

This document was written by Joel Land.

Other Information

  • CVE IDs: CVE-2015-2897
  • Date Public: 07 Aug 2015
  • Date First Published: 07 Aug 2015
  • Date Last Updated: 10 Aug 2015
  • Document Revision: 41


If you have feedback, comments, or additional information about this vulnerability, please send us email.