Executive Summary

Title Sierra Wireless GX, ES, and LS gateways running ALEOS contain hard-coded credentials
Name VU#628568 First vendor Publication 2015-08-07
Vendor VU-CERT Last vendor Modification 2015-08-10
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Vulnerability Note VU#628568

Sierra Wireless GX, ES, and LS gateways running ALEOS contain hard-coded credentials

Original Release date: 07 Aug 2015 | Last revised: 10 Aug 2015


Sierra Wireless GX, ES, and LS gateway devices running ALEOS versions 4.4.1 and earlier contain hard-coded credentials.


CWE-259: Use of Hard-coded Password - CVE-2015-2897

Sierra Wireless GX, ES, and LS gateways running ALEOS contain multiple hard-coded accounts with root privileges. These accounts are enabled by default and accessible by telnet or SSH in systems using ALEOS 4.3.4 or earlier. The accounts also exist and are enabled in versions 4.3.5 to 4.4.1, though remote access is disabled by default.


A remote, unauthenticated attacker may be able to gain full control of an affected device.


Apply an update

Sierra Wireless has released version 4.4.2 to address this issue by disabling access to the hard-coded accounts by default. Users unable or unwilling to update may also consider the following workaround.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from using credentials from a blocked network location. Refer to the Sierra Wireless technical bulletin for more information about restricting access.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Sierra WirelessAffected17 Jul 201503 Aug 2015
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)



  • http://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---cve-2015-2897/
  • http://source.sierrawireless.com/resources/airlink/software_reference_docs/release-notes/aleos-4,-d-,4,-d-,2-release-notes/
  • http://cwe.mitre.org/data/definitions/259.html


Thanks to the reporter who wishes to remain anonymous.

This document was written by Joel Land.

Other Information

  • CVE IDs:CVE-2015-2897
  • Date Public:07 Aug 2015
  • Date First Published:07 Aug 2015
  • Date Last Updated:10 Aug 2015
  • Document Revision:41


If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/628568

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-200 Information Exposure

CPE : Common Platform Enumeration

Application 1
Os 10

Alert History

If you want to see full details history, please login or register.
Date Informations
2015-08-12 00:30:37
  • Multiple Updates
2015-08-11 00:25:42
  • Multiple Updates
2015-08-10 17:32:57
  • Multiple Updates
2015-08-10 17:28:08
  • Multiple Updates
2015-08-08 09:30:45
  • Multiple Updates
2015-08-08 05:25:00
  • First insertion