First published: Fri Jun 07 2019(Updated: )
An issue was discovered on Moxa AWK-3121 1.14 devices. The session cookie "Password508" does not have an HttpOnly flag. This allows an attacker who is able to execute a cross-site scripting attack to steal the cookie very easily.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Awk-3121 Firmware | =1.14 | |
Moxa AWK-3121 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10692 is considered a high severity issue due to the risk of session hijacking through cross-site scripting.
To fix CVE-2018-10692, you should ensure that the session cookie is set with the HttpOnly flag to prevent access by JavaScript.
CVE-2018-10692 specifically affects Moxa AWK-3121 devices running firmware version 1.14.
CVE-2018-10692 can be exploited through cross-site scripting (XSS) attacks.
The risk associated with CVE-2018-10692 includes the potential for an attacker to steal session cookies and impersonate users.