#VU71592 Improper Neutralization of Argument Delimiters in a Command in Sierra Wireless Hardware solutions


Published: 2023-01-27

Vulnerability identifier: #VU71592

Vulnerability risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-46649

CWE-ID: CWE-88

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Airlink Router ES450
Hardware solutions / Routers & switches, VoIP, GSM, etc
Airlink Router GX450
Hardware solutions / Routers & switches, VoIP, GSM, etc
Airlink Router MP70
Hardware solutions / Routers & switches, VoIP, GSM, etc
Airlink Router RV50
Hardware solutions / Routers & switches, VoIP, GSM, etc
Airlink Router RV50x
Hardware solutions / Routers & switches, VoIP, GSM, etc
Airlink Router RV55
Hardware solutions / Routers & switches, VoIP, GSM, etc
Airlink Router LX 40
Hardware solutions / Routers & switches, VoIP, GSM, etc
Airlink Router LX60
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: Sierra Wireless

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to an argument injection issue. A remote user on the local network can manipulate the IP logging operation to execute arbitrary shell commands on the device.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Airlink Router ES450: 4.9.7

Airlink Router GX450: 4.9.7


External links
http://ics-cert.us-cert.gov/advisories/icsa-23-026-04


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability