search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Sierra Wireless GX, ES, and LS gateways running ALEOS contain hard-coded credentials

Vulnerability Note VU#628568

Original Release Date: 2015-08-07 | Last Revised: 2015-08-10

Overview

Sierra Wireless GX, ES, and LS gateway devices running ALEOS versions 4.4.1 and earlier contain hard-coded credentials.

Description

CWE-259: Use of Hard-coded Password - CVE-2015-2897

Sierra Wireless GX, ES, and LS gateways running ALEOS contain multiple hard-coded accounts with root privileges. These accounts are enabled by default and accessible by telnet or SSH in systems using ALEOS 4.3.4 or earlier. The accounts also exist and are enabled in versions 4.3.5 to 4.4.1, though remote access is disabled by default.

Impact

A remote, unauthenticated attacker may be able to gain full control of an affected device.

Solution

Apply an update

Sierra Wireless has released version 4.4.2 to address this issue by disabling access to the hard-coded accounts by default. Users unable or unwilling to update may also consider the following workaround.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from using credentials from a blocked network location. Refer to the Sierra Wireless technical bulletin for more information about restricting access.

Vendor Information

628568
 
Affected   Unknown   Unaffected

Sierra Wireless

Notified:  July 17, 2015 Updated:  August 03, 2015

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 10.0 AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal 8.3 E:F/RL:OF/RC:C
Environmental 6.7 CDP:MH/TD:M/CR:ND/IR:H/AR:ND

References

Acknowledgements

Thanks to the reporter who wishes to remain anonymous.

This document was written by Joel Land.

Other Information

CVE IDs: CVE-2015-2897
Date Public: 2015-08-07
Date First Published: 2015-08-07
Date Last Updated: 2015-08-10 20:56 UTC
Document Revision: 41

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.