The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has incorrectly implemented protections from session fixation, which may allow an attacker to gain access to a session and hijack it by stealing the user’s cookies.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-287-01 | Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-20-287-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://us-cert.cisa.gov/ics/advisories/icsa-20-287-01 - Third Party Advisory, US Government Resource |
Information
Published : 2020-12-23 15:15
Updated : 2024-11-21 05:17
NVD link : CVE-2020-25198
Mitre link : CVE-2020-25198
CVE.ORG link : CVE-2020-25198
JSON object : View
Products Affected
moxa
- nport_iaw5000a-i\/o
- nport_iaw5000a-i\/o_firmware
CWE
CWE-384
Session Fixation