First published: Thu Nov 23 2017(Updated: )
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The password encryption method can be retrieved from the firmware. This encryption method is based on a chall value that is sent in cleartext as a POST parameter. An attacker could reverse the password encryption algorithm to retrieve it.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Eds-g512e Firmware | =5.1 | |
MOXA EDS-G512E |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13699 is classified as a medium severity vulnerability.
To fix CVE-2017-13699, update the firmware of MOXA EDS-G512E to the latest version provided by the vendor.
CVE-2017-13699 specifically affects MOXA EDS-G512E devices running firmware version 5.1.
CVE-2017-13699 is a security vulnerability related to the insecure management of password encryption.
Yes, CVE-2017-13699 can potentially be exploited remotely due to the cleartext transmission of sensitive data.