RSS   Vulnerabilities for 'Eds-510a firmware'   RSS

2019-04-15
 
CVE-2019-6526

CWE-310
 

 
Moxa IKS-G6824A series Versions 4.5 and prior, EDS-405A series Version 3.8 and prior, EDS-408A series Version 3.8 and prior, and EDS-510A series Version 3.8 and prior use plaintext transmission of sensitive data, which may allow an attacker to capture sensitive data such as an administrative password.

 
2019-03-05
 
CVE-2019-6565

CWE-79
 

 
Moxa IKS and EDS fails to properly validate user input, giving unauthenticated and authenticated attackers the ability to perform XSS attacks, which may be used to send a malicious script.

 
 
CVE-2019-6563

CWE-200
 

 
Moxa IKS and EDS generate a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator's password, which could lead to a full compromise of the device.

 
 
CVE-2019-6561

CWE-352
 

 
Cross-site request forgery has been identified in Moxa IKS and EDS, which may allow for the execution of unauthorized actions on the device.

 
 
CVE-2019-6559

CWE-400
 

 
Moxa IKS and EDS allow remote authenticated users to cause a denial of service via a specially crafted packet, which may cause the switch to crash.

 
 
CVE-2019-6557

CWE-119
 

 
Several buffer overflow vulnerabilities have been identified in Moxa IKS and EDS, which may allow remote code execution.

 
 
CVE-2019-6524

CWE-287
 

 
Moxa IKS and EDS do not implement sufficient measures to prevent multiple failed authentication attempts, which may allow an attacker to discover passwords via brute force attack.

 
 
CVE-2019-6522

CWE-125
 

 
Moxa IKS and EDS fails to properly check array bounds which may allow an attacker to read device memory on arbitrary addresses, and may allow an attacker to retrieve sensitive data or cause device reboot.

 
 
CVE-2019-6520

CWE-284
 

 
Moxa IKS and EDS does not properly check authority on server side, which results in a read-only user being able to perform arbitrary configuration changes.

 
 
CVE-2019-6518

CWE-200
 

 
Moxa IKS and EDS store plaintext passwords, which may allow sensitive information to be read by someone with access to the device.

 


Copyright 2019, cxsecurity.com

 

Back to Top