Unrated severityNVD Advisory· Published Jan 15, 2014· Updated Apr 29, 2026
CVE-2013-2820
CVE-2013-2820
Description
The Sierra Wireless AirLink Raven X EV-DO gateway 4221_4.0.11.003 and 4228_4.0.11.003 allows remote attackers to reprogram the firmware via a replay attack using UDP ports 17336 and 17388.
Affected products
20cpe:2.3:o:sierrawireless:raven_x_ev-do_firmware:4221_4.0.11.003:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:sierrawireless:raven_x_ev-do_firmware:4221_4.0.11.003:*:*:*:*:*:*:*
- cpe:2.3:o:sierrawireless:raven_x_ev-do_firmware:4228_4.0.11.003:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:airlink_mp_at\&t:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:airlink_mp_at\&t_wifi:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:airlink_mp_bell:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:airlink_mp_bell_wifi:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:airlink_mp_row:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:airlink_mp_row_wifi:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:airlink_mp_sprint:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:airlink_mp_sprint_wifi:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:airlink_mp_telus:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:airlink_mp_telus_wifi:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:airlink_mp_verizon:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:airlink_mp_verizon_wifi:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:pinpoint_x:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:pinpoint_xt:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:raven_x:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:raven_x_ev-do:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:raven_xe:-:*:*:*:*:*:*:*
- cpe:2.3:h:sierrawireless:raven_xt:-:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.sierrawireless.com/resources/support/airlink/docs/raven%20security%20vulnerability%202014-01-10.pdfnvdVendor Advisory
- ics-cert.us-cert.gov/advisories/ICSA-14-007-01AnvdUS Government Resource
News mentions
0No linked articles in our index yet.