An issue was discovered on Moxa AWK-3121 1.14 devices. The device by default allows HTTP traffic thus providing an insecure communication mechanism for a user connecting to the web server. This allows an attacker to sniff the traffic easily and allows an attacker to compromise sensitive data such as credentials.
References
Link | Resource |
---|---|
https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121 | Exploit Third Party Advisory |
https://seclists.org/bugtraq/2019/Jun/8 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-06-07 13:29
Updated : 2023-02-28 11:30
NVD link : CVE-2018-10690
Mitre link : CVE-2018-10690
JSON object : View
CWE
CWE-311
Missing Encryption of Sensitive Data
Products Affected
moxa
- awk-3121_firmware
- awk-3121