sierrawireless CVE Vulnerabilities & Metrics

Focus on sierrawireless vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About sierrawireless Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with sierrawireless. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total sierrawireless CVEs: 51
Earliest CVE date: 15 Jan 2014, 16:08 UTC
Latest CVE date: 25 Dec 2023, 09:15 UTC

Latest CVE reference: CVE-2023-38321

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical sierrawireless CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.93

Max CVSS: 10.0

Critical CVEs (≥9): 10

CVSS Range vs. Count

Range Count
0.0-3.9 14
4.0-6.9 22
7.0-8.9 7
9.0-10.0 10

CVSS Distribution Chart

Top 5 Highest CVSS sierrawireless CVEs

These are the five CVEs with the highest CVSS scores for sierrawireless, sorted by severity first and recency.

All CVEs for sierrawireless

CVE-2023-38321 sierrawireless vulnerability CVSS: 0 25 Dec 2023, 09:15 UTC

OpenNDS, as used in Sierra Wireless ALEOS before 4.17.0.12 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference, daemon crash, and Captive Portal outage) via a GET request to /opennds_auth/ that lacks a custom query string parameter and client-token.

CVE-2023-40465 sierrawireless vulnerability CVSS: 0 04 Dec 2023, 23:15 UTC

Several versions of ALEOS, including ALEOS 4.16.0, include an opensource third-party component which can be exploited from the local area network, resulting in a Denial of Service condition for the captive portal.

CVE-2023-40464 sierrawireless vulnerability CVSS: 0 04 Dec 2023, 23:15 UTC

Several versions of ALEOS, including ALEOS 4.16.0, use a hardcoded SSL certificate and private key. An attacker with access to these items could potentially perform a man in the middle attack between the ACEManager client and ACEManager server.

CVE-2023-40463 sierrawireless vulnerability CVSS: 0 04 Dec 2023, 23:15 UTC

When configured in debugging mode by an authenticated user with administrative privileges, ALEOS 4.16 and earlier store the SHA512 hash of the common root password for that version in a directory accessible to a user with root privileges or equivalent access.

CVE-2023-40462 sierrawireless vulnerability CVSS: 0 04 Dec 2023, 23:15 UTC

The ACEManager component of ALEOS 4.16 and earlier does not perform input sanitization during authentication, which could potentially result in a Denial of Service (DoS) condition for ACEManager without impairing other router functions. ACEManager recovers from the DoS condition by restarting within ten seconds of becoming unavailable.

CVE-2023-40461 sierrawireless vulnerability CVSS: 0 04 Dec 2023, 23:15 UTC

The ACEManager component of ALEOS 4.16 and earlier allows an authenticated user with Administrator privileges to access a file upload field which does not fully validate the file name, creating a Stored Cross-Site Scripting condition.

CVE-2023-40460 sierrawireless vulnerability CVSS: 0 04 Dec 2023, 23:15 UTC

The ACEManager component of ALEOS 4.16 and earlier does not validate uploaded file names and types, which could potentially allow an authenticated user to perform client-side script execution within ACEManager, altering the device functionality until the device is restarted.

CVE-2023-40459 sierrawireless vulnerability CVSS: 0 04 Dec 2023, 23:15 UTC

The ACEManager component of ALEOS 4.16 and earlier does not adequately perform input sanitization during authentication, which could potentially result in a Denial of Service (DoS) condition for ACEManager without impairing other router functions. ACEManager recovers from the DoS condition by restarting within ten seconds of becoming unavailable.

CVE-2023-40458 sierrawireless vulnerability CVSS: 0 29 Nov 2023, 23:15 UTC

Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Sierra Wireless, Inc ALEOS could potentially allow a remote attacker to trigger a Denial of Service (DoS) condition for ACEManager without impairing other router functions. This condition is cleared by restarting the device.

CVE-2022-46650 sierrawireless vulnerability CVSS: 0 10 Feb 2023, 18:15 UTC

Acemanager in ALEOS before version 4.16 allows a user with valid credentials to reconfigure the device to expose the ACEManager credentials on the pre-login status page.

CVE-2022-46649 sierrawireless vulnerability CVSS: 0 10 Feb 2023, 18:15 UTC

Acemanager in ALEOS before version 4.16 allows a user with valid credentials to manipulate the IP logging operation to execute arbitrary shell commands on the device.

CVE-2019-11851 sierrawireless vulnerability CVSS: 0 26 Dec 2022, 22:15 UTC

The ACENet service in Sierra Wireless ALEOS before 4.4.9, 4.5.x through 4.9.x before 4.9.5, and 4.10.x through 4.13.x before 4.14.0 allows remote attackers to execute arbitrary code via a buffer overflow.

CVE-2019-13988 sierrawireless vulnerability CVSS: 0 26 Dec 2022, 21:15 UTC

Sierra Wireless MGOS before 3.15.2 and 4.x before 4.3 allows attackers to read log files via a Direct Request (aka Forced Browsing).

CVE-2020-11101 sierrawireless vulnerability CVSS: 0 26 Dec 2022, 20:15 UTC

Sierra Wireless AirLink Mobility Manager (AMM) before 2.17 mishandles sessions and thus an unauthenticated attacker can obtain a login session with administrator privileges.

CVE-2020-8782 sierrawireless vulnerability CVSS: 7.5 06 Oct 2020, 14:15 UTC

Unauthenticated RPC server on ALEOS before 4.4.9, 4.9.5, and 4.14.0 allows remote code execution.

CVE-2020-8781 sierrawireless vulnerability CVSS: 7.2 06 Oct 2020, 14:15 UTC

Lack of input sanitization in UpdateRebootMgr service of ALEOS 4.11 and later allow an escalation to root from a low-privilege process.

CVE-2019-11862 sierrawireless vulnerability CVSS: 4.6 21 Aug 2020, 19:15 UTC

The SSH service on ALEOS before 4.12.0, 4.9.5, 4.4.9 allows traffic proxying.

CVE-2019-11859 sierrawireless vulnerability CVSS: 9.0 21 Aug 2020, 19:15 UTC

A buffer overflow exists in the SMS handler API of ALEOS before 4.13.0, 4.9.5, 4.9.4 that may allow code execution as root.

CVE-2019-11858 sierrawireless vulnerability CVSS: 6.5 21 Aug 2020, 19:15 UTC

Multiple buffer overflow vulnerabilities exist in the AceManager Web API of ALEOS before 4.13.0, 4.9.5, and 4.4.9.

CVE-2019-11857 sierrawireless vulnerability CVSS: 4.0 21 Aug 2020, 19:15 UTC

Lack of input sanitization in AceManager of ALEOS before 4.12.0, 4.9.5 and 4.4.9 allows disclosure of sensitive system information.

CVE-2019-11856 sierrawireless vulnerability CVSS: 5.5 21 Aug 2020, 19:15 UTC

A nonce reuse vulnerability exists in the ACEView service of ALEOS before 4.13.0, 4.9.5, and 4.4.9 allowing message replay. Captured traffic to the ACEView service can be replayed to other gateways sharing the same credentials.

CVE-2019-11855 sierrawireless vulnerability CVSS: 7.5 21 Aug 2020, 19:15 UTC

An RPC server is enabled by default on the gateway's LAN of ALEOS before 4.12.0, 4.9.5, and 4.4.9.

CVE-2019-11853 sierrawireless vulnerability CVSS: 6.5 21 Aug 2020, 19:15 UTC

Several potential command injections vulnerabilities exist in the AT command interface of ALEOS before 4.11.0, and 4.9.4.

CVE-2019-11852 sierrawireless vulnerability CVSS: 6.4 21 Aug 2020, 19:15 UTC

An out-of-bounds reads vulnerability exists in the ACEView Service of ALEOS before 4.13.0, 4.9.5, and 4.4.9. Sensitive information may be disclosed via the ACEviewservice, accessible by default on the LAN.

CVE-2019-11850 sierrawireless vulnerability CVSS: 4.6 21 Aug 2020, 19:15 UTC

A stack overflow vulnerabiltity exist in the AT command interface of ALEOS before 4.11.0. The vulnerability may allow code execution

CVE-2019-11849 sierrawireless vulnerability CVSS: 4.6 21 Aug 2020, 19:15 UTC

A stack overflow vulnerabiltity exists in the AT command APIs of ALEOS before 4.11.0. The vulnerability may allow code execution.

CVE-2019-11848 sierrawireless vulnerability CVSS: 6.5 21 Aug 2020, 19:15 UTC

An API abuse vulnerability exists in the AT command API of ALEOS before 4.13.0, 4.9.5, 4.4.9 due to lack of length checking when handling certain user-provided values.

CVE-2019-11847 sierrawireless vulnerability CVSS: 7.2 21 Aug 2020, 19:15 UTC

An improper privilege management vulnerabitlity exists in ALEOS before 4.11.0, 4.9.4 and 4.4.9. An authenticated user can escalate to root via the command shell.

CVE-2018-4064 sierrawireless vulnerability CVSS: 5.5 31 Oct 2019, 21:15 UTC

An exploitable unverified password change vulnerability exists in the ACEManager upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a unverified device configuration change, resulting in an unverified change of the user password on the device. An attacker can make an authenticated HTTP request to trigger this vulnerability.

CVE-2018-4073 sierrawireless vulnerability CVSS: 6.5 06 May 2019, 19:29 UTC

An exploitable Permission Assignment vulnerability exists in the ACEManager EmbeddedAceSet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. The the binary the endpoint /cgi-bin/Embeded_Ace_TLSet_Task.cgi is a very similar endpoint that is designed for use with setting table values that can cause an arbitrary setting writes, resulting in the unverified changes to any system setting. An attacker can make an authenticated HTTP request, or run the binary as any user, to trigger this vulnerability.

CVE-2018-4072 sierrawireless vulnerability CVSS: 6.5 06 May 2019, 19:29 UTC

An exploitable Permission Assignment vulnerability exists in the ACEManager EmbeddedAceSet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. The EmbeddedAceSet_Task.cgi executable is used to change MSCII configuration values within the configuration manager of the AirLink ES450. This binary does not have any restricted configuration settings, so once the MSCIID is discovered, any authenticated user can send configuration changes using the /cgi-bin/Embedded_Ace_Set_Task.cgi endpoint.

CVE-2018-4071 sierrawireless vulnerability CVSS: 4.0 06 May 2019, 19:29 UTC

An exploitable Information Disclosure vulnerability exists in the ACEManager EmbeddedAceGet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. The EmbeddedAceTLGet_Task.cgi executable is used to retrieve MSCII configuration values within the configuration manager of the AirLink ES450. This binary does not have any restricted configuration settings, so once the MSCIID is discovered, any authenticated user can send configuration changes using the /cgi-bin/Embedded_Ace_TLGet_Task.cgi endpoint.

CVE-2018-4070 sierrawireless vulnerability CVSS: 4.0 06 May 2019, 19:29 UTC

An exploitable Information Disclosure vulnerability exists in the ACEManager EmbeddedAceGet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. This binary does not have any restricted configuration settings, so once the MSCIID is discovered, any authenticated user can send configuration changes using the /cgi-bin/Embedded_Ace_Get_Task.cgi endpoint.

CVE-2018-4067 sierrawireless vulnerability CVSS: 4.0 06 May 2019, 19:29 UTC

An exploitable information disclosure vulnerability exists in the ACEManager template_load.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a information leak, resulting in the disclosure of internal paths and files. An attacker can make an authenticated HTTP request to trigger this vulnerability.

CVE-2018-4066 sierrawireless vulnerability CVSS: 6.8 06 May 2019, 19:29 UTC

An exploitable cross-site request forgery vulnerability exists in the ACEManager functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause an authenticated user to perform privileged requests unknowingly, resulting in unauthenticated requests being requested through an authenticated user. An attacker can get an authenticated user to request authenticated pages on the attacker's behalf to trigger this vulnerability.

CVE-2018-4065 sierrawireless vulnerability CVSS: 4.3 06 May 2019, 19:29 UTC

An exploitable cross-site scripting vulnerability exists in the ACEManager ping_result.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP ping request can cause reflected javascript code execution, resulting in the execution of javascript code running on the victim's browser. An attacker can get a victim to click a link, or embedded URL, that redirects to the reflected cross-site scripting vulnerability to trigger this vulnerability.

CVE-2018-4063 sierrawireless vulnerability CVSS: 9.0 06 May 2019, 19:29 UTC

An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.

CVE-2018-4062 sierrawireless vulnerability CVSS: 9.3 06 May 2019, 19:29 UTC

A hard-coded credentials vulnerability exists in the snmpd function of the Sierra Wireless AirLink ES450 FW 4.9.3. Activating snmpd outside of the WebUI can cause the activation of the hard-coded credentials, resulting in the exposure of a privileged user. An attacker can activate snmpd without any configuration changes to trigger this vulnerability.

CVE-2018-4069 sierrawireless vulnerability CVSS: 5.0 06 May 2019, 18:29 UTC

An information disclosure vulnerability exists in the ACEManager authentication functionality of Sierra Wireless AirLink ES450 FW 4.9.3. The ACEManager authentication functionality is done in plaintext XML to the web server. An attacker can listen to network traffic upstream from the device to capitalize on this vulnerability.

CVE-2018-4068 sierrawireless vulnerability CVSS: 5.0 06 May 2019, 18:29 UTC

An exploitable information disclosure vulnerability exists in the ACEManager functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A HTTP request can result in disclosure of the default configuration for the device. An attacker can send an unauthenticated HTTP request to trigger this vulnerability.

CVE-2018-4061 sierrawireless vulnerability CVSS: 9.0 06 May 2019, 18:29 UTC

An exploitable command injection vulnerability exists in the ACEManager iplogging.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can inject arbitrary commands, resulting in arbitrary command execution. An attacker can send an authenticated HTTP request to trigger this vulnerability.

CVE-2018-10251 sierrawireless vulnerability CVSS: 10.0 04 May 2018, 20:29 UTC

A vulnerability in Sierra Wireless AirLink GX400, GX440, ES440, and LS300 routers with firmware before 4.4.7 and GX450, ES450, RV50, RV50X, MP70, and MP70E routers with firmware before 4.9.3 could allow an unauthenticated remote attacker to execute arbitrary code and gain full control of an affected system, including issuing commands with root privileges.

CVE-2017-9247 sierrawireless vulnerability CVSS: 4.6 02 Aug 2017, 19:29 UTC

Multiple unquoted service path vulnerabilities in Sierra Wireless Windows Mobile Broadband Driver Package (MBDP) with build ID < 4657 allows local users to launch processes with elevated privileges.

CVE-2016-5071 sierrawireless vulnerability CVSS: 10.0 10 Apr 2017, 03:59 UTC

Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 execute the management web application as root.

CVE-2016-5070 sierrawireless vulnerability CVSS: 5.0 10 Apr 2017, 03:59 UTC

Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 store passwords in cleartext.

CVE-2016-5069 sierrawireless vulnerability CVSS: 7.5 10 Apr 2017, 03:59 UTC

Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 use guessable session tokens, which are in the URL.

CVE-2016-5068 sierrawireless vulnerability CVSS: 7.5 10 Apr 2017, 03:59 UTC

Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 do not require authentication for Embedded_Ace_Get_Task.cgi requests.

CVE-2016-5067 sierrawireless vulnerability CVSS: 9.0 10 Apr 2017, 03:59 UTC

Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 allow Hayes AT command injection.

CVE-2016-5066 sierrawireless vulnerability CVSS: 10.0 10 Apr 2017, 03:59 UTC

Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 have weak passwords for admin, rauser, sconsole, and user.

CVE-2016-5065 sierrawireless vulnerability CVSS: 7.5 10 Apr 2017, 03:59 UTC

Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 allow Embedded_Ace_Set_Task.cgi command injection.

CVE-2015-6479 sierrawireless vulnerability CVSS: 4.3 21 Apr 2016, 10:59 UTC

ACEmanager in Sierra Wireless ALEOS 4.4.2 and earlier on ES440, ES450, GX400, GX440, GX450, and LS300 devices allows remote attackers to read the filteredlogs.txt file, and consequently discover potentially sensitive boot-sequence information, via unspecified vectors.

CVE-2013-2820 sierrawireless vulnerability CVSS: 10.0 15 Jan 2014, 16:08 UTC

The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to reprogram the firmware via a replay attack using UDP ports 17336 and 17388.

CVE-2013-2819 sierrawireless vulnerability CVSS: 9.3 15 Jan 2014, 16:08 UTC

The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to install Trojan horse firmware by leveraging cleartext credentials in a crafted (1) update or (2) reprogramming action.