ID CVE-2019-6526
Summary Moxa IKS-G6824A series Versions 4.5 and prior, EDS-405A series Version 3.8 and prior, EDS-408A series Version 3.8 and prior, and EDS-510A series Version 3.8 and prior use plaintext transmission of sensitive data, which may allow an attacker to capture sensitive data such as an administrative password.
References
Vulnerable Configurations
  • cpe:2.3:o:moxa:iks-g6824a_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:moxa:iks-g6824a_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:moxa:iks-g6824a:-:*:*:*:*:*:*:*
    cpe:2.3:h:moxa:iks-g6824a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:moxa:eds-405a_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:moxa:eds-405a_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:moxa:eds-405a:-:*:*:*:*:*:*:*
    cpe:2.3:h:moxa:eds-405a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:moxa:eds-408a_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:moxa:eds-408a_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:moxa:eds-408a:-:*:*:*:*:*:*:*
    cpe:2.3:h:moxa:eds-408a:-:*:*:*:*:*:*:*
  • cpe:2.3:o:moxa:eds-510a_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:moxa:eds-510a_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:moxa:eds-510a:-:*:*:*:*:*:*:*
    cpe:2.3:h:moxa:eds-510a:-:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 09-10-2019 - 23:51)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
misc https://ics-cert.us-cert.gov/advisories/ICSA-19-057-01
Last major update 09-10-2019 - 23:51
Published 15-04-2019 - 12:31
Back to Top