First published: Wed Jul 03 2019(Updated: )
Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary monitoring protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. The protocol is vulnerable to remote unauthenticated disclosure of sensitive information, including the administrator's password. Under certain conditions, it's also possible to retrieve additional information, such as content of HTTP requests to the device, or the previously used password, due to memory leakages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Oncell G3150-HSDPA Firmware | <=1.6 | |
Moxa Oncell G3150-HSPA-T Firmware | ||
Moxa OnCell G3150-HSPA-T Firmware | <=1.6 | |
Moxa Oncell G3150-HSPA-T Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-11421 is classified as high due to the lack of security controls in the monitoring protocol.
To fix CVE-2018-11421, update the firmware of Moxa OnCell G3100-HSPA Series devices to a version later than 1.6 Build 17100315.
The risks associated with CVE-2018-11421 include interception and modification of sensitive information transmitted in plain text.
CVE-2018-11421 affects the Moxa OnCell G3100-HSPA Series devices running firmware version 1.6 or earlier.
It is not safe to use Moxa OnCell G3100-HSPA devices with CVE-2018-11421 due to their vulnerability to data interception and manipulation.