Action is required for users of Sierra Wireless gateways who have GPS or Location Services enabled on their gateways and who do not have the most current firmware running on their gateways. (Note: This issue could affect you even if you do not have a GPS antenna connected.)
- ISSUE IMPACT: Your Sierra Wireless gateways will no longer be able to be remotely managed; all gateway hosted certificate-based communication will stop working; and Location Services reporting will be inaccurate.
- ISSUE CATALYST: GPS Rollover, which will impact Sierra Wireless gateways on November 3rd 2019.
- IMPACTED DEVICES ARE LIMITED TO:
- RV50 (1102555)
- NOT IMPACTED: RV50X ( 1103052), MG90, MP70, ES440, ES450, LX60, LX40
- ISSUE MITIGATION: Mitigation can be achieved by updating the firmware to a current ALEOS firmware on the gateway. Mitigation can also be achieved by disabling the GPS or Location Services on the gateway or enabling a functional System Network Time Protocol (SNTP) time server. These actions can be achieved by using AceManager, ALMS or AM/AMM. Instructions for applying a firmware update via AceManager can be viewed here: https://usatcorp.com/critical-update-needed-for-airlink-gateways-using-gps/. The firmware version that must be successfully applied to the Sierra Wireless Gateway to mitigate the issue must be at or above the following ALEOS version:
- RV50 (1102555)–ALEOS 4.12.0
- GX450–ALEOS 4.9.4
- LS300/GX400—ALEOS 4.4.8 (In addition, for 3G CDMA devices, GPS must be disabled)
- GX440—ALEOS 4.4.8 (In addition, GX440s settings should be set to “LTE Only Mode”)
- ISSUE SUMMARY: GPS rollover is worldwide
event that impacts all GPS devices. It impacts the system time that is reported
on the Sierra Wireless gateways if GPS or Location Services are enabled.
If not enabled, the gateway pulls system time from other available resources.
Any application that queries the Transport Layer Security (TLS) Digital
Certificate on a gateway that shows an incorrect system time will fail the
security handshake with the Sierra Wireless gateway. In addition to the
reporting accuracy of all Location Services, this will impact the performance
of any applications that require a security handshake. Applications that
require a security handshake include all Sierra Wireless device health
management systems and other applications including:
- Sierra Wireless AceManager
- Sierra WirelessALMS
- Sierra Wireless AM/AMM
- All gateway hosted certificate-based applications which can include applications like the following examples: certain VPN tunnel methods, event-based email communications, LDAP authentication, remote logging
Additional information is available within the
original Sierra Wireless Product Bulletin on this matter that can be read here: