Vulnerability identifier: #VU71592
Vulnerability risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-88
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
Airlink Router ES450
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Airlink Router GX450
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Airlink Router MP70
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Airlink Router RV50
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Airlink Router RV50x
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Airlink Router RV55
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Airlink Router LX 40
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Airlink Router LX60
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Sierra Wireless
Description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to an argument injection issue. A remote user on the local network can manipulate the IP logging operation to execute arbitrary shell commands on the device.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Airlink Router ES450: 4.9.7
Airlink Router GX450: 4.9.7
External links
http://ics-cert.us-cert.gov/advisories/icsa-23-026-04
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.