First published: Mon Feb 13 2017(Updated: )
An issue was discovered in Moxa MiiNePort E1 versions prior to 1.8, E2 versions prior to 1.4, and E3 versions prior to 1.1. An attacker may be able to brute force an active session cookie to be able to download configuration files.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Miineport E1 Firmware | <=1.7 | |
Moxa Miineport E2 Firmware | <=1.3 | |
Moxa Miineport E3 Firmware | <=1.0 | |
Moxa MiiNePort E1 | ||
Moxa Miineport E2 | ||
Moxa Miineport E3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9344 is considered a medium severity vulnerability due to the potential for session hijacking.
To fix CVE-2016-9344, upgrade the firmware of Moxa MiiNePort E1 to version 1.8 or higher, E2 to version 1.4 or higher, and E3 to version 1.1 or higher.
CVE-2016-9344 affects Moxa MiiNePort E1, E2, and E3 firmware versions prior to the specified updates.
The impact of CVE-2016-9344 allows an attacker to brute force an active session cookie and potentially download confidential configuration files.
A temporary workaround for CVE-2016-9344 includes limiting access to the affected devices and monitoring for unauthorized session attempts.