First published: Wed Jul 03 2019(Updated: )
A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Oncell G3150-HSDPA Firmware | <=1.4 | |
Moxa Oncell G3150-HSPA-T Firmware | ||
Moxa OnCell G3150-HSPA-T Firmware | <=1.4 | |
Moxa Oncell G3150-HSPA-T Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-11426 is considered to be high due to the potential for unauthorized access to the web interface.
To fix CVE-2018-11426, update the firmware of the Moxa OnCell G3100-HSPA Series to a version later than 1.4 Build 16062919.
CVE-2018-11426 affects Moxa OnCell G3100-HSPA Series firmware version 1.4 Build 16062919 and earlier.
Yes, CVE-2018-11426 can be exploited remotely as an attacker can brute force cookie parameters to bypass authentication.
After exploiting CVE-2018-11426, the attacker can access all functions of the web interface except for changing the password.