The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote malicious users to reprogram the firmware via a replay attack using UDP ports 17336 and 17388.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sierrawireless raven_x_ev-do_firmware 4221_4.0.11.003 |
||
sierrawireless raven_x_ev-do_firmware 4228_4.0.11.003 |
||
sierrawireless airlink_mp_row - |
||
sierrawireless airlink_mp_row_wifi - |
||
sierrawireless airlink_mp_sprint - |
||
sierrawireless airlink_mp_sprint_wifi - |
||
sierrawireless airlink_mp_verizon - |
||
sierrawireless airlink_mp_bell - |
||
sierrawireless airlink_mp_telus - |
||
sierrawireless airlink_mp_verizon_wifi - |
||
sierrawireless pinpoint_xt - |
||
sierrawireless airlink_mp_at\\&t - |
||
sierrawireless airlink_mp_at\\&t_wifi - |
||
sierrawireless raven_xt - |
||
sierrawireless raven_xe - |
||
sierrawireless raven_x - |
||
sierrawireless airlink_mp_bell_wifi - |
||
sierrawireless airlink_mp_telus_wifi - |
||
sierrawireless raven_x_ev-do - |
||
sierrawireless pinpoint_x - |