A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change.
References
Link | Resource |
---|---|
https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-105.md | Third Party Advisory |
https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-105.md | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-105.md - Third Party Advisory |
Information
Published : 2019-07-03 15:15
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11426
Mitre link : CVE-2018-11426
CVE.ORG link : CVE-2018-11426
JSON object : View
Products Affected
moxa
- oncell_g3150-hspa
- oncell_g3150-hspa_firmware
- oncell_g3150-hspa-t
- oncell_g3150-hspa-t_firmware
CWE
CWE-287
Improper Authentication