{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T14:02:11.318","vulnerabilities":[{"cve":{"id":"CVE-2023-40458","sourceIdentifier":"security@sierrawireless.com","published":"2023-11-29T23:15:20.367","lastModified":"2024-11-21T08:19:30.713","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Sierra Wireless, Inc ALEOS could potentially allow a remote attacker to trigger a \nDenial of Service (DoS) condition for ACEManager without impairing \nother router functions. This condition is cleared by restarting the \ndevice.\n\n"},{"lang":"es","value":"Vulnerabilidad de bucle con condición de salida inalcanzable (\"bucle infinito\") en Sierra Wireless, Inc. ALEOS podría potencialmente permitir que un atacante remoto active una condición de Denegación de Servicio (DoS) para ACEManager sin afectar otras funciones del router. Esta condición se elimina reiniciando el dispositivo."}],"metrics":{"cvssMetricV31":[{"source":"security@sierrawireless.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@sierrawireless.com","type":"Secondary","description":[{"lang":"en","value":"CWE-835"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-835"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sierrawireless:aleos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.9.8","matchCriteriaId":"79B70B8B-C6C1-428C-88A5-5E85AE32C187"},{"vulnerable":true,"criteria":"cpe:2.3:o:sierrawireless:aleos:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10.0","versionEndIncluding":"4.16.2","matchCriteriaId":"BB0B824A-C2A5-4637-B779-397D96FCE3B2"}]}]}],"references":[{"url":"https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.5ZcnyPM1.dpbs","source":"security@sierrawireless.com","tags":["Vendor Advisory"]},{"url":"https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.5ZcnyPM1.dpbs","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}