CVE-2012-4694

Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:moxa:edr_g903_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:edr_g903_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moxa:edr_g903_firmware:2.0:*:*:*:*:*:*:*
cpe:2.3:a:moxa:edr_g903_firmware:2.1:*:*:*:*:*:*:*
cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:43

Type Values Removed Values Added
References () http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf - US Government Resource () http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf - US Government Resource
References () http://www.moxa.com/support/download.aspx?type=support&id=492 - () http://www.moxa.com/support/download.aspx?type=support&id=492 -

Information

Published : 2013-02-15 12:09

Updated : 2024-11-21 01:43


NVD link : CVE-2012-4694

Mitre link : CVE-2012-4694

CVE.ORG link : CVE-2012-4694


JSON object : View

Products Affected

moxa

  • edr_g903_firmware
  • edr-g903
CWE
CWE-310

Cryptographic Issues