Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Title CalAmp LMU-3030 devices may not authenticate SMS interface
Name VU#251927 First vendor Publication 2017-06-08
Vendor VU-CERT Last vendor Modification 2017-06-16
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Vulnerability Note VU#251927

CalAmp LMU-3030 devices may not authenticate SMS interface

Original Release date: 08 Jun 2017 | Last revised: 14 Jun 2017


OBD-II devices are used to provide telematics information for managers of fleets of vehicles. One type of device, manufactured by CalAmp, has an SMS (text message) interface. We have found multiple deployments where no password was configured for this interface by the integrator / reseller. Companies using the CalAmp hardware should be aware that they need to set a password or disable SMS. Vendors were notified and the SMS interface was disabled or password-protected by all vendors known to be affected.


CWE-306: Missing Authentication for Critical Function - CVE-2017-3217

The CalAmp LMU 3030 series of devices includes an SMS interface on both CDMA and GSM versions of the device. This interface must be password protected, otherwise, the attacker only needs to know the phone number of the device (via an IMSI Catcher, for example) to send administrative commands to the device. These commands can be used to provide ongoing, real-time access to the device and can configure parameters such as IP addresses, firewall rules, and passwords.


The devices provide vehicle tracking via GPS coordinates, heading, and speed, as well as maintenance information. Older versions of the firmware could be remotely updated with malicious code that could affect the CAN bus of the vehicle.


Configure SMS password

Vendors that were known to be affected have been contacted and have password-protected or disabled the SMS interface. Other vendors that use the CalAmp LMU-3030 in their system should do the same.

Update device firmware

We recommend upgrading to the latest firmware from CalAmp in order to provide “defense in depth”. These devices can have complex supply chains so the reseller may need to work with a service provider or systems integrator to make these changes.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
AT&TAffected17 Apr 201708 Jun 2017
CalAmp Inc.Affected17 Apr 201714 Jun 2017
GPS InsightAffected17 Apr 201708 Jun 2017
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)



  • http://cwe.mitre.org/data/definitions/306.html


We would like to thank all of the affected vendors for addressing this quickly.

This document was written by Dan Klinedinst.

Other Information

  • CVE IDs:CVE-2017-3217
  • Date Public:08 Jun 2017
  • Date First Published:08 Jun 2017
  • Date Last Updated:14 Jun 2017
  • Document Revision:17


If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/251927

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-306 Missing Authentication for Critical Function (CWE/SANS Top 25)

CPE : Common Platform Enumeration

Os 1
Os 1
Os 1

Alert History

If you want to see full details history, please login or register.
Date Informations
2018-10-05 17:21:34
  • Multiple Updates
2018-07-24 21:21:46
  • Multiple Updates
2017-06-16 21:22:11
  • First insertion