First published: Fri Feb 15 2013(Updated: )
Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Edr G903 Firmware | <=2.2 | |
Moxa Edr G903 Firmware | =1.0 | |
Moxa Edr G903 Firmware | =2.0 | |
Moxa Edr G903 Firmware | =2.1 | |
Moxa EDR-G903 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.