CVE-2017-13699

An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The password encryption method can be retrieved from the firmware. This encryption method is based on a chall value that is sent in cleartext as a POST parameter. An attacker could reverse the password encryption algorithm to retrieve it.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:moxa:eds-g512e_firmware:5.1:*:*:*:*:*:*:*
cpe:2.3:h:moxa:eds-g512e:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:11

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/106047 - () http://www.securityfocus.com/bid/106047 -
References () https://www.sentryo.net/wp-content/uploads/2017/11/Switch-Moxa-Analysis.pdf - Mitigation, Third Party Advisory () https://www.sentryo.net/wp-content/uploads/2017/11/Switch-Moxa-Analysis.pdf - Mitigation, Third Party Advisory

Information

Published : 2017-11-23 21:29

Updated : 2024-11-21 03:11


NVD link : CVE-2017-13699

Mitre link : CVE-2017-13699

CVE.ORG link : CVE-2017-13699


JSON object : View

Products Affected

moxa

  • eds-g512e
  • eds-g512e_firmware
CWE
CWE-326

Inadequate Encryption Strength