On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets.
Max CVSS
7.8
EPSS Score
0.10%
Published
2019-12-11
Updated
2019-12-17
Moxa EDR 810, all versions 5.1 and prior, allows an authenticated attacker to abuse the ping feature to execute unauthorized commands on the router, which may allow an attacker to perform remote code execution.
Max CVSS
7.2
EPSS Score
0.70%
Published
2019-10-08
Updated
2019-10-23
Moxa IKS and EDS generate a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator's password, which could lead to a full compromise of the device.
Max CVSS
10.0
EPSS Score
0.22%
Published
2019-03-05
Updated
2020-10-05
Cross-site request forgery has been identified in Moxa IKS and EDS, which may allow for the execution of unauthorized actions on the device.
Max CVSS
8.8
EPSS Score
0.13%
Published
2019-03-05
Updated
2022-11-30
Several buffer overflow vulnerabilities have been identified in Moxa IKS and EDS, which may allow remote code execution.
Max CVSS
9.8
EPSS Score
0.83%
Published
2019-03-05
Updated
2022-11-30
Moxa IKS-G6824A series Versions 4.5 and prior, EDS-405A series Version 3.8 and prior, EDS-408A series Version 3.8 and prior, and EDS-510A series Version 3.8 and prior use plaintext transmission of sensitive data, which may allow an attacker to capture sensitive data such as an administrative password.
Max CVSS
9.8
EPSS Score
0.21%
Published
2019-04-15
Updated
2021-11-03
Moxa IKS and EDS do not implement sufficient measures to prevent multiple failed authentication attempts, which may allow an attacker to discover passwords via brute force attack.
Max CVSS
9.8
EPSS Score
0.19%
Published
2019-03-05
Updated
2020-10-19
Moxa IKS and EDS fails to properly check array bounds which may allow an attacker to read device memory on arbitrary addresses, and may allow an attacker to retrieve sensitive data or cause device reboot.
Max CVSS
9.1
EPSS Score
0.19%
Published
2019-03-05
Updated
2022-11-30
Moxa IKS and EDS does not properly check authority on server side, which results in a read-only user being able to perform arbitrary configuration changes.
Max CVSS
7.5
EPSS Score
0.08%
Published
2019-03-05
Updated
2020-10-19
Moxa IKS and EDS store plaintext passwords, which may allow sensitive information to be read by someone with access to the device.
Max CVSS
7.5
EPSS Score
0.13%
Published
2019-03-05
Updated
2020-10-19
CSRF tokens are not used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior, which makes it possible to perform CSRF attacks on the device administrator.
Max CVSS
8.8
EPSS Score
0.08%
Published
2019-07-03
Updated
2019-07-10
A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change.
Max CVSS
9.8
EPSS Score
0.43%
Published
2019-07-03
Updated
2019-07-10
Memory corruption issue was discovered in Moxa OnCell G3470A-LTE Series version 1.6 Build 18021314 and prior, a different vulnerability than CVE-2018-11424.
Max CVSS
9.8
EPSS Score
0.22%
Published
2019-07-03
Updated
2019-07-10
There is Memory corruption in the web interface of Moxa OnCell G3470A-LTE Series version 1.6 Build 18021314 and prior, a different vulnerability than CVE-2018-11425.
Max CVSS
7.8
EPSS Score
0.10%
Published
2019-07-03
Updated
2020-08-24
There is Memory corruption in the web interface Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior, different vulnerability than CVE-2018-11420.
Max CVSS
7.8
EPSS Score
0.10%
Published
2019-07-03
Updated
2019-07-10
Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary configuration protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. Any commands (including device reboot, configuration download or upload, or firmware upgrade) are accepted and executed by the device without authentication.
Max CVSS
9.8
EPSS Score
0.22%
Published
2019-07-03
Updated
2020-08-24
Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary monitoring protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. The protocol is vulnerable to remote unauthenticated disclosure of sensitive information, including the administrator's password. Under certain conditions, it's also possible to retrieve additional information, such as content of HTTP requests to the device, or the previously used password, due to memory leakages.
Max CVSS
9.8
EPSS Score
0.21%
Published
2019-07-03
Updated
2020-08-24
There is Memory corruption in the web interface of Moxa OnCell G3100-HSPA Series version 1.5 Build 17042015 and prio,r a different vulnerability than CVE-2018-11423.
Max CVSS
9.8
EPSS Score
0.22%
Published
2019-07-03
Updated
2020-08-24
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_serverip" is susceptible to buffer overflow. By crafting a packet that contains a string of 480 characters, it is possible for an attacker to execute the attack.
Max CVSS
8.8
EPSS Score
0.23%
Published
2019-06-07
Updated
2019-06-10
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to command injection via shell metacharacters.
Max CVSS
8.8
EPSS Score
0.65%
Published
2019-06-07
Updated
2023-02-28
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to buffer overflow. By crafting a packet that contains a string of 162 characters, it is possible for an attacker to execute the attack.
Max CVSS
8.8
EPSS Score
0.23%
Published
2019-06-07
Updated
2019-06-11
An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides certfile upload functionality so that an administrator can upload a certificate file used for connecting to the wireless network. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_privatePass" is susceptible to this injection. By crafting a packet that contains shell metacharacters, it is possible for an attacker to execute the attack.
Max CVSS
8.8
EPSS Score
0.46%
Published
2019-06-07
Updated
2020-08-24
An issue was discovered on Moxa AWK-3121 1.14 devices. The device enables an unencrypted TELNET service by default. This allows an attacker who has been able to gain an MITM position to easily sniff the traffic between the device and the user. Also an attacker can easily connect to the TELNET daemon using the default credentials if they have not been changed by the user.
Max CVSS
10.0
EPSS Score
2.63%
Published
2019-06-07
Updated
2023-02-28
An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "srvName" is susceptible to this injection. By crafting a packet that contains shell metacharacters, it is possible for an attacker to execute the attack.
Max CVSS
9.3
EPSS Score
0.65%
Published
2019-06-07
Updated
2023-02-28
An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a web interface to allow an administrator to manage the device. However, this interface is not protected against CSRF attacks, which allows an attacker to trick an administrator into executing actions without his/her knowledge, as demonstrated by the forms/iw_webSetParameters and forms/webSetMainRestart URIs.
Max CVSS
8.8
EPSS Score
0.70%
Published
2019-06-07
Updated
2019-06-11
32 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!