First published: Fri Feb 15 2013(Updated: )
Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Edr G903 Firmware | <=2.2 | |
Moxa Edr G903 Firmware | =1.0 | |
Moxa Edr G903 Firmware | =2.0 | |
Moxa Edr G903 Firmware | =2.1 | |
Moxa EDR-G903 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4694 is considered a high severity vulnerability due to the risk of man-in-the-middle attacks.
To fix CVE-2012-4694, upgrade the Moxa EDR-G903 series router firmware to version 2.11 or later.
CVE-2012-4694 affects Moxa EDR-G903 series routers with firmware versions prior to 2.11.
CVE-2012-4694 can be exploited for man-in-the-middle attacks, allowing attackers to spoof devices or alter data streams.
The insufficient entropy for SSH and SSL keys in CVE-2012-4694 reduces the randomness and security of cryptographic keys, making them easier to predict.