First published: Thu Nov 23 2017(Updated: )
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. An attacker could extract public and private keys from the firmware image available on the MOXA website and could use them against a production switch that has the default keys embedded.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Eds-g512e Firmware | =5.1 | |
Moxa Eds-g512e Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13698 is considered a critical vulnerability due to the potential exposure of private keys.
To fix CVE-2017-13698, update the MOXA EDS-G512E firmware to a version that addresses this vulnerability.
Exploiting CVE-2017-13698 allows attackers to extract sensitive keys, thereby compromising the security of the device.
CVE-2017-13698 specifically affects MOXA EDS-G512E devices running firmware version 5.1.
Yes, an attacker could exploit CVE-2017-13698 remotely by accessing the firmware image from the MOXA website.