First published: Wed Dec 11 2019(Updated: )
On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Eds-g508e Firmware | <=6.0 | |
Moxa EDS-G508E | ||
Moxa Eds-g512e Firmware | <=6.0 | |
MOXA EDS-G512E | ||
Moxa Eds-g516e Firmware | <=6.0 | |
Moxa EDS-G516E |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19707 is classified as a denial of service vulnerability affecting certain Moxa Ethernet switches.
To fix CVE-2019-19707, upgrade the firmware of Moxa EDS-G508E, EDS-G512E, or EDS-G516E devices to a version later than 6.0.
The affected devices include Moxa EDS-G508E, EDS-G512E, and EDS-G516E models with firmware version 6.0 or earlier.
CVE-2019-19707 can lead to a denial of service, causing disruption to network services on affected Moxa devices.
There are no documented workarounds for CVE-2019-19707; updating the firmware is the recommended solution.