Description
Moxa IKS and EDS generate a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator's password, which could lead to a full compromise of the device.
Published: 2019-03-05
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-16122 Moxa IKS and EDS generate a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator's password, which could lead to a full compromise of the device.
History

No history.

Subscriptions

Moxa Eds-405a Eds-405a Firmware Eds-408a Eds-408a Firmware Eds-510a Eds-510a Firmware Iks-g6824a Iks-g6824a Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-16T18:44:20.929Z

Reserved: 2019-01-22T00:00:00.000Z

Link: CVE-2019-6563

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-05T20:29:00.547

Modified: 2024-11-21T04:46:42.157

Link: CVE-2019-6563

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses