Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
References
Link | Resource |
---|---|
http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf | US Government Resource |
http://www.moxa.com/support/download.aspx?type=support&id=492 | |
http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf | US Government Resource |
http://www.moxa.com/support/download.aspx?type=support&id=492 |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf - US Government Resource | |
References | () http://www.moxa.com/support/download.aspx?type=support&id=492 - |
Information
Published : 2013-02-15 12:09
Updated : 2024-11-21 01:43
NVD link : CVE-2012-4694
Mitre link : CVE-2012-4694
CVE.ORG link : CVE-2012-4694
JSON object : View
Products Affected
moxa
- edr_g903_firmware
- edr-g903
CWE
CWE-310
Cryptographic Issues