CVE-2018-4063
moderate-risk
Published 2019-05-06
An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Do I need to act?
-
0.80% chance of exploitation
EPSS score — low exploit probability
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (10)
Broken Link
http://www.securityfocus.com/bid/108147
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03
Broken Link
http://www.securityfocus.com/bid/108147
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-...
45
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
10/34 · Low
Exposure
5/34 · Minimal