First published: Fri Apr 13 2018(Updated: )
An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a GET request to "/MOXA\_CFG2.ini" without a cookie header to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa EDR-810 VPN 2G-SFP Firmware | =4.1 | |
Moxa EDR-810 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14436 has a medium severity rating due to its potential to cause denial of service.
To mitigate CVE-2017-14436, upgrade the Moxa EDR-810 firmware to a version that addresses this vulnerability.
CVE-2017-14436 affects the Moxa EDR-810 with firmware version 4.1.
CVE-2017-14436 is associated with denial of service attacks, triggered by specially crafted HTTP URIs.
Yes, an attacker can exploit CVE-2017-14436 remotely by sending a specially crafted GET request.