{"vuid":"VU#628568","idnumber":"628568","name":"Sierra Wireless GX, ES, and LS gateways running ALEOS contain hard-coded credentials","keywords":["Sierra Wireless","ALEOS","hard-coded credentials","CWE-259"],"overview":"Sierra Wireless GX, ES, and LS gateway devices running ALEOS versions 4.4.1 and earlier contain hard-coded credentials.","clean_desc":"CWE-259: Use of Hard-coded Password - CVE-2015-2897 Sierra Wireless GX, ES, and LS gateways running ALEOS contain multiple hard-coded accounts with root privileges. These accounts are enabled by default and accessible by telnet or SSH in systems using ALEOS 4.3.4 or earlier. The accounts also exist and are enabled in versions 4.3.5 to 4.4.1, though remote access is disabled by default.","impact":"A remote, unauthenticated attacker may be able to gain full control of an affected device.","resolution":"Apply an update Sierra Wireless has released version 4.4.2 to address this issue by disabling access to the hard-coded accounts by default. Users unable or unwilling to update may also consider the following workaround.","workarounds":"Restrict access As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from using credentials from a blocked network location. Refer to the Sierra Wireless technical bulletin for more information about restricting access.","sysaffected":"","thanks":"Thanks to the reporter who wishes to remain anonymous.","author":"This document was written by Joel Land.","public":["http://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---cve-2015-2897/","http://source.sierrawireless.com/resources/airlink/software_reference_docs/release-notes/aleos-4,-d-,4,-d-,2-release-notes/","http://cwe.mitre.org/data/definitions/259.html"],"cveids":["CVE-2015-2897"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-07-07T12:06:03Z","publicdate":"2015-08-07T00:00:00Z","datefirstpublished":"2015-08-07T22:38:56Z","dateupdated":"2015-08-10T20:56:41Z","revision":42,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"MH","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"H","cvss_securityrequirementsar":"ND","cvss_basescore":"10","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvss_temporalscore":"8.3","cvss_environmentalscore":"6.717202448736","cvss_environmentalvector":"CDP:MH/TD:M/CR:ND/IR:H/AR:ND","metric":0.0,"vulnote":null}