Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2022-46649 CVE-2022-46650 |
CWE-ID | CWE-88 CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Airlink Router ES450 Hardware solutions / Routers & switches, VoIP, GSM, etc Airlink Router GX450 Hardware solutions / Routers & switches, VoIP, GSM, etc Airlink Router MP70 Hardware solutions / Routers & switches, VoIP, GSM, etc Airlink Router RV50 Hardware solutions / Routers & switches, VoIP, GSM, etc Airlink Router RV50x Hardware solutions / Routers & switches, VoIP, GSM, etc Airlink Router RV55 Hardware solutions / Routers & switches, VoIP, GSM, etc Airlink Router LX 40 Hardware solutions / Routers & switches, VoIP, GSM, etc Airlink Router LX60 Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Sierra Wireless |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU71592
Risk: Medium
CVSSv4.0: 6.1 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-46649
CWE-ID:
CWE-88 - Argument Injection or Modification
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to an argument injection issue. A remote user on the local network can manipulate the IP logging operation to execute arbitrary shell commands on the device.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAirlink Router ES450: - - 4.9.7
Airlink Router GX450: - - 4.9.7
Airlink Router MP70: All versions
Airlink Router RV50: All versions
Airlink Router RV50x: All versions
Airlink Router RV55: All versions
Airlink Router LX 40: All versions
Airlink Router LX60: All versions
CPE2.3https://ics-cert.us-cert.gov/advisories/icsa-23-026-04
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU71594
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-46650
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote administrator can reconfigure the device to expose the ACEManager credentials on the pre-login status page.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAirlink Router ES450: - - 4.9.7
Airlink Router GX450: - - 4.9.7
Airlink Router MP70: All versions
Airlink Router RV50: All versions
Airlink Router RV50x: All versions
Airlink Router RV55: All versions
Airlink Router LX 40: All versions
Airlink Router LX60: All versions
CPE2.3https://ics-cert.us-cert.gov/advisories/icsa-23-026-04
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.