In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered.
References
Link | Resource |
---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory US Government Resource |
https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.us-cert.gov/ics/advisories/icsa-20-056-04 - Third Party Advisory, US Government Resource |
Information
Published : 2020-03-24 21:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-6979
Mitre link : CVE-2020-6979
CVE.ORG link : CVE-2020-6979
JSON object : View
Products Affected
moxa
- eds-g516e_firmware
- eds-g516e
- eds-510e
- eds-510e_firmware