CISA KEV 정보
| 취약점명 | Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability |
|---|---|
| 설명 | Sierra Wireless AirLink ALEOS contains an unrestricted upload of file with dangerous type vulnerability. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. |
| 조치사항 | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-434 |
| 등록일 (KEV) | 2025-12-12 |
| 조치 기한 | 2026-01-02 |
| 추가 참고 | https://www.cisa.gov/news-events/ics-advisories/icsa-19-122-03 ; https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---swi-psa-2019-003 ; https://source.sierrawireless.com/resources/airlink/hardware_reference_docs/airlink_es450_eol ; https://nvd.nist.gov/vuln/detail/CVE-2018-4063 |
NVD 상세 정보
CVSS v3.1: 8.8 HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 9.0
AV:N/AC:L/Au:S/C:C/I:C/A:C설명: An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CWE: CWE-434 | CWE-434
참조
- http://packetstormsecurity.com/files/152648/Sierra-Wireless-AirLink-ES450-ACEManager-upload.cgi-Remote-Code-Execution.html [Exploit, VDB Entry]
- http://www.securityfocus.com/bid/108147 [Broken Link]
- https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03 [Third Party Advisory, US Government Resource]
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0748 [Exploit, Third Party Advisory]
- http://packetstormsecurity.com/files/152648/Sierra-Wireless-AirLink-ES450-ACEManager-upload.cgi-Remote-Code-Execution.html [Exploit, VDB Entry]
- http://www.securityfocus.com/bid/108147 [Broken Link]
- https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03 [Third Party Advisory, US Government Resource]
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0748 [Exploit, Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-4063 [US Government Resource]
- https://www.forescout.com/blog/ot-network-security-threats-industrial-routers-under-attack/ [Exploit, Third Party Advisory]
This product uses the NVD API but is not endorsed or certified by the NVD.