ID CVE-2019-6526
Summary Moxa IKS-G6824A series Versions 4.5 and prior, EDS-405A series Version 3.8 and prior, EDS-408A series Version 3.8 and prior, and EDS-510A series Version 3.8 and prior use plaintext transmission of sensitive data, which may allow an attacker to capture sensitive data such as an administrative password.
References
Vulnerable Configurations
  • cpe:2.3:o:moxa:iks-g6824a_firmware:4.5
    cpe:2.3:o:moxa:iks-g6824a_firmware:4.5
  • cpe:2.3:h:moxa:iks-g6824a
    cpe:2.3:h:moxa:iks-g6824a
  • cpe:2.3:o:moxa:eds-405a_firmware:3.8
    cpe:2.3:o:moxa:eds-405a_firmware:3.8
  • cpe:2.3:h:moxa:eds-405a
    cpe:2.3:h:moxa:eds-405a
  • cpe:2.3:o:moxa:eds-408a_firmware:3.8
    cpe:2.3:o:moxa:eds-408a_firmware:3.8
  • cpe:2.3:h:moxa:eds-408a
    cpe:2.3:h:moxa:eds-408a
  • cpe:2.3:o:moxa:eds-510a_firmware:3.8
    cpe:2.3:o:moxa:eds-510a_firmware:3.8
  • cpe:2.3:h:moxa:eds-510a
    cpe:2.3:h:moxa:eds-510a
CVSS
Base: 5.0
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
refmap via4
misc https://ics-cert.us-cert.gov/advisories/ICSA-19-057-01
Last major update 15-04-2019 - 08:31
Published 15-04-2019 - 08:31
Last modified 15-04-2019 - 15:30
Back to Top