The NPort IA5000A Series devices use Telnet as one of the network device management services. Telnet does not support the encryption of client-server communications, making it vulnerable to Man-in-the-Middle attacks.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 05:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://ics-cert.kaspersky.com/advisories/klcert-advisories/2021/05/11/klcert-20-020%2C - | |
References | () https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities - Vendor Advisory |
07 Nov 2023, 03:20
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-05-14 13:15
Updated : 2024-11-21 05:20
NVD link : CVE-2020-27184
Mitre link : CVE-2020-27184
CVE.ORG link : CVE-2020-27184
JSON object : View
Products Affected
moxa
- nport_ia5250a
- nport_ia5150a
- nport_ia5450a_firmware
- nport_ia5450a
- nport_ia5250a_firmware
- nport_ia5150a_firmware
CWE
CWE-319
Cleartext Transmission of Sensitive Information