First published: Wed Apr 12 2017(Updated: )
An exploitable Cleartext Transmission of Password vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. The Change Password functionality of the Web Application transmits the password in cleartext. An attacker capable of intercepting this traffic is able to obtain valid credentials.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa AWK-3131A firmware | =1.1 | |
Moxa AWK-3131A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8716 has been assigned a medium severity score due to the potential for password interception.
To fix CVE-2016-8716, update the firmware of the Moxa AWK-3131A Wireless Access Point to a version that secures password transmission.
CVE-2016-8716 allows an attacker to intercept passwords transmitted in cleartext, compromising user accounts and data.
CVE-2016-8716 affects Moxa AWK-3131A devices running firmware version 1.1.
CVE-2016-8716 is not a hardware vulnerability; it is specific to the web application functionality of the affected firmware.