First published: Fri Jun 07 2019(Updated: )
An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a Wi-Fi connection that is open and does not use any encryption mechanism by default. An administrator who uses the open wireless connection to set up the device can allow an attacker to sniff the traffic passing between the user's computer and the device. This can allow an attacker to steal the credentials passing over the HTTP connection as well as TELNET traffic. Also an attacker can MITM the response and infect a user's computer very easily as well.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa AWK-3121 Firmware | =1.14 | |
Moxa Awk-3121 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10694 is considered a high severity vulnerability due to the lack of encryption on the default Wi-Fi connection.
To fix CVE-2018-10694, configure the Wi-Fi connection to use a strong encryption method and ensure that access controls are implemented.
The vulnerability affects Moxa AWK-3121 devices running firmware version 1.14.
CVE-2018-10694 can allow an attacker to conduct traffic sniffing and potentially intercept sensitive data transmitted over the open Wi-Fi connection.
There is no specific patch available for CVE-2018-10694, but securing the Wi-Fi connection can mitigate the risks associated with this vulnerability.