First published: Wed Aug 24 2016(Updated: )
Moxa OnCell G3100V2 devices before 2.8 and G3111, G3151, G3211, and G3251 devices before 1.7 do not properly restrict authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Oncell G3001 Firmware | <=1.6 | |
Moxa OnCell Gateway G3111 | ||
Moxa Oncell Gateway Firmware | ||
Moxa Oncell Gateway Firmware | ||
Moxa Oncell G3251 Firmware | ||
Moxa Oncell G3100v2 Firmware | <=2.7 | |
Moxa Oncell G3100v2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5799 is considered to have a medium severity due to its potential to allow brute-force attacks on authentication.
To fix CVE-2016-5799, update the Moxa OnCell G3100V2 devices to version 2.8 or higher and other affected models to their respective fixed versions.
CVE-2016-5799 affects Moxa OnCell G3100V2 devices before version 2.8 and OnCell G3001 devices before version 1.6.
Yes, CVE-2016-5799 can be exploited remotely by attackers using brute-force techniques to gain unauthorized access.
While updating firmware is the recommended solution, temporarily restricting access through network controls may help mitigate the risks associated with CVE-2016-5799.