Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below. * ioLogik E1200 Series : Please contact Moxa Technical Support for the security patch (v3.3.7). https://www.moxa.com/tw/support/technical-support
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58233 | A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization. |
Mon, 28 Oct 2024 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization. | A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization. |
| Weaknesses | CWE-328 |
Subscriptions
Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2024-10-28T06:14:46.184Z
Reserved: 2023-11-06T07:47:33.243Z
Link: CVE-2023-5962
No data.
Status : Modified
Published: 2023-12-23T09:15:08.050
Modified: 2024-11-21T08:42:52.350
Link: CVE-2023-5962
No data.
OpenCVE Enrichment
No data.
EUVD