Sierra Wireless AirLink ALEOS (Update B)
Sierra Wireless ALEOS firmware contains multiple critical vulnerabilities (CWE-78 remote code execution, CWE-798 hardcoded credentials, CWE-434 unrestricted file upload, CWE-79 cross-site scripting, CWE-352 CSRF, CWE-200 information disclosure). Successful exploitation allows remote code execution, credential disclosure, unauthorized file upload, and path enumeration. Affected products: MP70, MP70E, RV50, RV50X, LX40, LX60 (all versions before 4.12); LS300, GX400, GX440, ES440 (all versions before 4.4.9); GX450, ES450 (all versions before 4.9.4).
- Network access to the device's management interface (web port, typically 80/443)
- No authentication required for some vulnerabilities (hardcoded credentials or unauthenticated endpoints)
- Device must be running a vulnerable firmware version (before 4.12, 4.4.9, or 4.9.4 depending on product)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bfa1b254-d1c9-4ae2-978a-6f370ae6d005Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.