Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary configuration protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. Any commands (including device reboot, configuration download or upload, or firmware upgrade) are accepted and executed by the device without authentication.
References
Link | Resource |
---|---|
https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-104.md | Third Party Advisory |
https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-104.md | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-104.md - Third Party Advisory |
Information
Published : 2019-07-03 16:15
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11422
Mitre link : CVE-2018-11422
CVE.ORG link : CVE-2018-11422
JSON object : View
Products Affected
moxa
- oncell_g3150-hspa
- oncell_g3150-hspa_firmware
- oncell_g3150-hspa-t
- oncell_g3150-hspa-t_firmware
CWE
CWE-319
Cleartext Transmission of Sensitive Information