An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The password encryption method can be retrieved from the firmware. This encryption method is based on a chall value that is sent in cleartext as a POST parameter. An attacker could reverse the password encryption algorithm to retrieve it.
References
Link | Resource |
---|---|
https://www.sentryo.net/wp-content/uploads/2017/11/Switch-Moxa-Analysis.pdf | Mitigation Third Party Advisory |
http://www.securityfocus.com/bid/106047 |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-11-23 13:29
Updated : 2018-11-30 03:29
NVD link : CVE-2017-13699
Mitre link : CVE-2017-13699
JSON object : View
CWE
CWE-326
Inadequate Encryption Strength
Products Affected
moxa
- eds-g512e_firmware
- eds-g512e