Vulnerability Note VU#628568
Sierra Wireless GX, ES, and LS gateways running ALEOS contain hard-coded credentials
Sierra Wireless GX, ES, and LS gateway devices running ALEOS versions 4.4.1 and earlier contain hard-coded credentials.
CWE-259: Use of Hard-coded Password - CVE-2015-2897
Sierra Wireless GX, ES, and LS gateways running ALEOS contain multiple hard-coded accounts with root privileges. These accounts are enabled by default and accessible by telnet or SSH in systems using ALEOS 4.3.4 or earlier. The accounts also exist and are enabled in versions 4.3.5 to 4.4.1, though remote access is disabled by default.
A remote, unauthenticated attacker may be able to gain full control of an affected device.
Apply an update
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Sierra Wireless||Affected||17 Jul 2015||03 Aug 2015|
CVSS Metrics (Learn More)
Thanks to the reporter who wishes to remain anonymous.
This document was written by Joel Land.
- CVE IDs: CVE-2015-2897
- Date Public: 07 Aug 2015
- Date First Published: 07 Aug 2015
- Date Last Updated: 10 Aug 2015
- Document Revision: 41
If you have feedback, comments, or additional information about this vulnerability, please send us email.