var-201706-0468
Vulnerability from variot

An Improper Authorization issue was discovered in Sierra Wireless AirLink Raven XE, all versions prior to 4.0.14, and AirLink Raven XT, all versions prior to 4.0.11. Several files and directories can be accessed without authentication, which may allow a remote attacker to perform sensitive functions including arbitrary file upload, file download, and device reboot. SierraWirelessAirLinkRavenXE and XT are wireless gateway products from Sierra Wireless, Canada. A successful exploit may allow an attacker to obtain sensitive information, and perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0468",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "airlink raven xt",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "airlink raven xe",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "wireless airlink raven xt",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "sierra",
        "version": "0"
      },
      {
        "model": "wireless airlink raven xe",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "sierra",
        "version": "0"
      },
      {
        "model": "airlink raven xe",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "sierra",
        "version": "4.0.14"
      },
      {
        "model": "airlink raven xt",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "sierra",
        "version": "4.0.11"
      },
      {
        "model": "airlink raven xe",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sierra",
        "version": null
      },
      {
        "model": "wireless airlink raven xt",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sierra",
        "version": "4.0.11"
      },
      {
        "model": "wireless airlink raven xe",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sierra",
        "version": "4.0.14"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "airlink raven xe",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "airlink raven xt",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "353aa0fb-843c-42d0-a916-bb2cfdc511a0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06884"
      },
      {
        "db": "BID",
        "id": "98036"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005261"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1500"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6044"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:sierra_wireless:airlink_raven_xe_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sierra_wireless:airlink_raven_xt_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005261"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Karn Ganeshen.",
    "sources": [
      {
        "db": "BID",
        "id": "98036"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1500"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2017-6044",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-6044",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-06884",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "353aa0fb-843c-42d0-a916-bb2cfdc511a0",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-114247",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-6044",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-6044",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-6044",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-06884",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201704-1500",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "353aa0fb-843c-42d0-a916-bb2cfdc511a0",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-114247",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-6044",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "353aa0fb-843c-42d0-a916-bb2cfdc511a0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06884"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114247"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-6044"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005261"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1500"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6044"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An Improper Authorization issue was discovered in Sierra Wireless AirLink Raven XE, all versions prior to 4.0.14, and AirLink Raven XT, all versions prior to 4.0.11. Several files and directories can be accessed without authentication, which may allow a remote attacker to perform sensitive functions including arbitrary file upload, file download, and device reboot. SierraWirelessAirLinkRavenXE and XT are wireless gateway products from Sierra Wireless, Canada. \nA successful exploit may allow an attacker to obtain sensitive information, and perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-6044"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005261"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06884"
      },
      {
        "db": "BID",
        "id": "98036"
      },
      {
        "db": "IVD",
        "id": "353aa0fb-843c-42d0-a916-bb2cfdc511a0"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114247"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-6044"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-6044",
        "trust": 3.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-115-02",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "98036",
        "trust": 2.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1500",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06884",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005261",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "353AA0FB-843C-42D0-A916-BB2CFDC511A0",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-114247",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-6044",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "353aa0fb-843c-42d0-a916-bb2cfdc511a0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06884"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114247"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-6044"
      },
      {
        "db": "BID",
        "id": "98036"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005261"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1500"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6044"
      }
    ]
  },
  "id": "VAR-201706-0468",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "353aa0fb-843c-42d0-a916-bb2cfdc511a0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06884"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114247"
      }
    ],
    "trust": 1.6368421
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "353aa0fb-843c-42d0-a916-bb2cfdc511a0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06884"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:01:05.017000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "AirLink Raven XE",
        "trust": 0.8,
        "url": "https://source.sierrawireless.com/devices/raven-series/raven-xe/"
      },
      {
        "title": "AirLink Raven XT",
        "trust": 0.8,
        "url": "https://source.sierrawireless.com/devices/raven-series/raven-xt/"
      },
      {
        "title": "Patch for SierraWirelessAirLinkRavenXE and XT File Download Vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/93893"
      },
      {
        "title": "Sierra Wireless AirLink Raven XE  and XT Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69693"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-06884"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005261"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1500"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-306",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-285",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114247"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005261"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6044"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-115-02"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/98036"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6044"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6044"
      },
      {
        "trust": 0.3,
        "url": "http://subscriber.communications.siemens.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/306.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-06884"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114247"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-6044"
      },
      {
        "db": "BID",
        "id": "98036"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005261"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1500"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6044"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "353aa0fb-843c-42d0-a916-bb2cfdc511a0"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06884"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114247"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-6044"
      },
      {
        "db": "BID",
        "id": "98036"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005261"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1500"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6044"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-05-18T00:00:00",
        "db": "IVD",
        "id": "353aa0fb-843c-42d0-a916-bb2cfdc511a0"
      },
      {
        "date": "2017-05-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-06884"
      },
      {
        "date": "2017-06-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-114247"
      },
      {
        "date": "2017-06-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-6044"
      },
      {
        "date": "2017-04-25T00:00:00",
        "db": "BID",
        "id": "98036"
      },
      {
        "date": "2017-07-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-005261"
      },
      {
        "date": "2017-04-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-1500"
      },
      {
        "date": "2017-06-30T03:29:00.627000",
        "db": "NVD",
        "id": "CVE-2017-6044"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-05-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-06884"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-114247"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-6044"
      },
      {
        "date": "2017-05-02T01:09:00",
        "db": "BID",
        "id": "98036"
      },
      {
        "date": "2017-07-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-005261"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-1500"
      },
      {
        "date": "2024-11-21T03:28:58.657000",
        "db": "NVD",
        "id": "CVE-2017-6044"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1500"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sierra Wireless AirLink Raven XE and  XT Vulnerabilities related to lack of authentication for critical functions",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005261"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Access control error",
    "sources": [
      {
        "db": "IVD",
        "id": "353aa0fb-843c-42d0-a916-bb2cfdc511a0"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1500"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…