The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to install Trojan horse firmware by leveraging cleartext credentials in a crafted (1) update or (2) reprogramming action.
                
            References
                    | Link | Resource | 
|---|---|
| http://ics-cert.us-cert.gov/advisories/ICSA-14-007-01A | US Government Resource | 
| http://www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdf | Vendor Advisory | 
| http://ics-cert.us-cert.gov/advisories/ICSA-14-007-01A | US Government Resource | 
| http://www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdf | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 01:52
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://ics-cert.us-cert.gov/advisories/ICSA-14-007-01A - US Government Resource | |
| References | () http://www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdf - Vendor Advisory | 
Information
                Published : 2014-01-15 16:08
Updated : 2025-04-11 00:51
NVD link : CVE-2013-2819
Mitre link : CVE-2013-2819
CVE.ORG link : CVE-2013-2819
JSON object : View
Products Affected
                sierrawireless
- airlink_mp_row
- raven_x
- airlink_mp_telus_wifi
- raven_xe
- airlink_mp_verizon_wifi
- raven_xt
- pinpoint_xt
- airlink_mp_telus
- airlink_mp_row_wifi
- airlink_mp_verizon
- airlink_mp_at\&t
- airlink_mp_sprint
- pinpoint_x
- airlink_mp_sprint_wifi
- airlink_mp_bell_wifi
- airlink_mp_at\&t_wifi
- airlink_mp_bell
- raven_x_ev-do_firmware
- raven_x_ev-do
CWE
                
                    
                        
                        CWE-255
                        
            Credentials Management Errors
