First published: Fri Aug 09 2013(Updated: )
Moxa OnCell Gateway G3111, G3151, G3211, and G3251 devices with firmware before 1.4 do not use a sufficient source of entropy for SSH and SSL keys, which makes it easier for remote attackers to obtain access by leveraging knowledge of a key from a product installation elsewhere.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Oncell Gateway Firmware | <=1.3 | |
Moxa OnCell Gateway G3111 | ||
Moxa Oncell G3151 | ||
Moxa Oncell G3211 | ||
Moxa Oncell Gateway G3251 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3039 is considered a high severity vulnerability due to the potential for unauthorized access to devices.
To fix CVE-2012-3039, update the firmware of Moxa OnCell Gateway devices to version 1.4 or later.
CVE-2012-3039 affects Moxa OnCell Gateway G3111, G3151, G3211, and G3251 devices with firmware prior to 1.4.
The risk associated with CVE-2012-3039 includes increased vulnerability to remote attacks due to weak SSH and SSL key generation.
Yes, CVE-2012-3039 can be exploited remotely by attackers who leverage knowledge of key information from other installations.