The ACENet service in Sierra Wireless ALEOS before 4.4.9, 4.5.x through 4.9.x before 4.9.5, and 4.10.x through 4.13.x before 4.14.0 allows remote attackers to execute arbitrary code via a buffer overflow.
References
Link | Resource |
---|---|
http://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2021-001.ashx | Vendor Advisory |
https://www.sierrawireless.com/company/security/ | Vendor Advisory |
http://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2021-001.ashx | Vendor Advisory |
https://www.sierrawireless.com/company/security/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2021-001.ashx - Vendor Advisory | |
References | () https://www.sierrawireless.com/company/security/ - Vendor Advisory |
Information
Published : 2022-12-26 22:15
Updated : 2025-04-16 19:44
NVD link : CVE-2019-11851
Mitre link : CVE-2019-11851
CVE.ORG link : CVE-2019-11851
JSON object : View
Products Affected
sierrawireless
- gx400
- lx40
- aleos
- rv50
- mp70
- rv50x
- es450
- gx440
- ls300
- lx60
- es440
- gx450
- mp70e
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')