Sierra Wireless Mitigates Vulnerability

Thursday, April 14, 2016 @ 06:04 PM gHale


Sierra Wireless produced a new version to mitigate an exposure of sensitive information in its ACEmanager application, according to a report on ICS-CERT.

This vulnerability, discovered by independent researcher Maxim Rupp, is remotely exploitable.

RELATED STORIES
Accuenergy Fixes Acuvim II Holes
Ecava Fixes IntegraXor Vulnerabilities
Siemens glibc Library Vulnerability
Siemens SCALANCE S613 DoS Hole

The following Sierra Wireless versions suffer from the issue:
• LS300 running ALEOS 4.4.2 and earlier
• GX400 running ALEOS 4.4.2 and earlier
• GX440 running ALEOS 4.4.2 and earlier
• ES440 running ALEOS 4.4.2 and earlier
• GX450 running ALEOS 4.4.2 and earlier
• ES450 running ALEOS 4.4.2 and earlier

Sierra Wireless has outlined the threat associated with attackers having access to the filteredlogs.txt file. Because of the diagnostic nature of such files, an attacker may be able to learn operational characteristics of the gateway, e.g., the sequence of operations at boot time.

Sierra Wireless is a Canadian-based company that maintains offices in several countries around the world, including the United States, France, and China.

The affected product, Sierra Wireless ACEmanager, is a gateway that provides connectivity to industrial, enterprise, and transportation organizations around the world. ACEmanager sees action across several sectors including commercial facilities, critical manufacturing, energy, and water and wastewater systems. Sierra Wireless estimates these products see use primarily in Canada, the United States, and Europe.

The file filteredlogs.txt is available without authorization. No sensitive information writes to the accessible log file, although because of the diagnostic nature of such files an attacker may be able to learn operational characteristics of the device, e.g., the sequence of operations at boot time. The accessible log file only persists until the next log view operation or until the device reboots.

CVE-2016-6479f is the case number assigned to this vulnerability, which has a CVSS v3 base score of 4.3.

No known public exploits specifically target this vulnerability. However, an attacker with a low skill would be able to exploit this vulnerability.

Sierra Wireless has produced a new version to mitigate this vulnerability.