AT&T Affected

Notified:  April 17, 2017 Updated: June 08, 2017

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CalAmp Inc. Affected

Notified:  April 17, 2017 Updated: June 14, 2017

Statement Date:   June 13, 2017

Status

Affected

Vendor Statement

CalAmp takes the security of our telematics devices very seriously. Our security commitment extends to providing customers with best-in-class security feature enhancements, and world-class applications support to combat any system level security vulnerabilities. The CERT vulnerability note (VU#251927) highlights a potential vulnerability for customers who have chosen not to use passwords. These customers are advised to comply with the CERT recommended solutions including the use of passwords, and to update to the latest device firmware to take advantage of enhanced security features. In addition to recommending the use of passwords and the use of security features that CalAmp builds into its products, CalAmp continually monitors the latest security trends and works with experts and authorities to ensure that we meet or exceed industry standards for protection.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

GPS Insight Affected

Notified:  April 17, 2017 Updated: June 08, 2017

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.