First published: Wed Jul 03 2019(Updated: )
Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary configuration protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. Any commands (including device reboot, configuration download or upload, or firmware upgrade) are accepted and executed by the device without authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Oncell G3150-HSDPA Firmware | <=1.6 | |
Moxa Oncell G3150-HSPA-T Firmware | ||
Moxa OnCell G3150-HSPA-T Firmware | <=1.6 | |
Moxa Oncell G3150-HSPA-T Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11422 is classified as a high-severity vulnerability due to its lack of encryption and integrity protections.
To fix CVE-2018-11422, update the Moxa OnCell G3100-HSPA Series firmware to the latest version that addresses this vulnerability.
CVE-2018-11422 affects Moxa OnCell G3100-HSPA Series versions up to 1.6 Build 17100315.
CVE-2018-11422 is a communication protocol vulnerability that exposes data transmission to risks of interception and manipulation.
No specific mitigations are mentioned for CVE-2018-11422 other than upgrading the firmware to maintain security.