First published: Fri Sep 11 2015(Updated: )
The administrative web interface on Moxa EDS-405A and EDS-408A switches with firmware before 3.6 allows remote authenticated users to bypass a read-only protection mechanism by using Firefox with a web-developer plugin.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Eds-405A Firmware | <=3.4 | |
Moxa Eds-408a | <=3.4 | |
Moxa Eds-405A Firmware | ||
Moxa Eds-408a Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6464 has a medium severity rating due to its implications for unauthorized access in the administrative interface.
Remote authenticated users can exploit CVE-2015-6464 by using Firefox along with a web-developer plugin to bypass the read-only protection mechanism.
CVE-2015-6464 affects Moxa EDS-405A and EDS-408A switches running firmware versions prior to 3.6.
To fix CVE-2015-6464, update the firmware of Moxa EDS-405A and EDS-408A switches to version 3.6 or later.
Using affected versions of Moxa firmware is not recommended as it may expose the system to potential unauthorized access risks.