An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The password encryption method can be retrieved from the firmware. This encryption method is based on a chall value that is sent in cleartext as a POST parameter. An attacker could reverse the password encryption algorithm to retrieve it.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106047 | |
https://www.sentryo.net/wp-content/uploads/2017/11/Switch-Moxa-Analysis.pdf | Mitigation Third Party Advisory |
http://www.securityfocus.com/bid/106047 | |
https://www.sentryo.net/wp-content/uploads/2017/11/Switch-Moxa-Analysis.pdf | Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/106047 - | |
References | () https://www.sentryo.net/wp-content/uploads/2017/11/Switch-Moxa-Analysis.pdf - Mitigation, Third Party Advisory |
Information
Published : 2017-11-23 21:29
Updated : 2024-11-21 03:11
NVD link : CVE-2017-13699
Mitre link : CVE-2017-13699
CVE.ORG link : CVE-2017-13699
JSON object : View
Products Affected
moxa
- eds-g512e
- eds-g512e_firmware
CWE
CWE-326
Inadequate Encryption Strength