Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
References
Link | Resource |
---|---|
http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf | US Government Resource |
http://www.moxa.com/support/download.aspx?type=support&id=492 |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2013-02-15 04:09
Updated : 2013-02-15 04:09
NVD link : CVE-2012-4694
Mitre link : CVE-2012-4694
JSON object : View
CWE
CWE-310
Cryptographic Issues
Products Affected
moxa
- edr-g903
- edr_g903_firmware