First published: Mon Mar 05 2018(Updated: )
A Reliance on Cookies without Validation and Integrity Checking issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. The application allows a cookie parameter to consist of only digits, allowing an attacker to perform a brute force attack bypassing authentication and gaining access to device functions.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Oncell G3110-HSDPA Firmware | <=1.4 | |
Moxa Oncell G3110-HSPA Firmware | ||
Moxa Oncell G3110-HSDPA Firmware | <=1.4 | |
Moxa Oncell G3110-HSDPA Firmware | ||
Moxa Oncell G3150-HSDPA Firmware | <=1.4 | |
Moxa Oncell G3150-HSPA-T Firmware | ||
Moxa OnCell G3150-HSPA-T Firmware | <=1.4 | |
Moxa Oncell G3150-HSPA-T Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5455 has been classified as a high severity vulnerability due to its potential to allow unauthorized access through brute force attacks.
To fix CVE-2018-5455, update the Moxa OnCell G3100-HSPA Series firmware to a version later than 1.4 Build 16062919.
CVE-2018-5455 allows attackers to bypass authentication, compromising the security of affected Moxa OnCell devices.
CVE-2018-5455 affects the Moxa OnCell G3100-HSPA Series, including the G3110 and G3150 models with firmware version 1.4 and earlier.
Currently, there are no known workarounds for CVE-2018-5455, so it is essential to update the firmware to mitigate the risk.