Browse all 3 CVE security advisories affecting Sierra Wireless. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Sierra Wireless specializes in IoT and M2M connectivity solutions, providing embedded modules and gateways for industrial and enterprise applications. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from default credentials and insecure interfaces. The company has addressed security flaws in AirLink and AirVantage platforms, with some instances allowing unauthorized access or system compromise. While no major public incidents have been widely reported, the presence of three current CVEs indicates ongoing security considerations. Their devices typically require careful network segmentation and regular firmware updates to mitigate risks associated with their complex attack surfaces.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-31280 | Exposure of Sensitive Information to an Unauthorized Actor — AirVantage, AirVantage-Capable Devices: All Sierra Wireless devices.CWE-200 | 5.3 | Medium | 2024-12-20 |
| CVE-2023-31279 | Improper Authentication — AirVantage, AirVantage-Capable Devices: All Sierra Wireless devices.CWE-287 | 8.1 | High | 2024-12-20 |
| CVE-2020-13712 | MGOS Command Injection — MGOSCWE-78 | 9.8 | - | 2024-12-20 |
This page lists every published CVE security advisory associated with Sierra Wireless. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.