Vulnerability CVE-2013-2820


Published: 2014-01-15

Description:
The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to reprogram the firmware via a replay attack using UDP ports 17336 and 17388.

Type:

CWE-287

(Improper Authentication)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Sierrawireless -> Raven x ev-do 
Sierrawireless -> Airlink mp at&t 
Sierrawireless -> Raven xe 
Sierrawireless -> Airlink mp at&t wifi 
Sierrawireless -> Raven xt 
Sierrawireless -> Airlink mp bell 
Sierrawireless -> Raven x ev-do firmware 
Sierrawireless -> Airlink mp bell wifi 
Sierrawireless -> Airlink mp row 
Sierrawireless -> Airlink mp row wifi 
Sierrawireless -> Airlink mp sprint 
Sierrawireless -> Airlink mp sprint wifi 
Sierrawireless -> Airlink mp telus 
Sierrawireless -> Airlink mp telus wifi 
Sierrawireless -> Airlink mp verizon 
Sierrawireless -> Airlink mp verizon wifi 
Sierrawireless -> Pinpoint x 
Sierrawireless -> Pinpoint xt 
Sierrawireless -> Raven x 

 References:
http://ics-cert.us-cert.gov/advisories/ICSA-14-007-01A
http://www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdf

Copyright 2021, cxsecurity.com

 

Back to Top