The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower allows SSH/Telnet sessions, which may be vulnerable to brute force attacks to bypass authentication.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-287-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-12-23 07:15
Updated : 2020-12-23 10:47
NVD link : CVE-2020-25196
Mitre link : CVE-2020-25196
JSON object : View
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
Products Affected
moxa
- nport_iaw5000a-i\/o
- nport_iaw5000a-i\/o_firmware