First published: Tue Feb 25 2020(Updated: )
An exploitable improper access control vulnerability exists in the iw_webs account settings functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa AWK-3131A firmware | =1.13 | |
Moxa AWK-3131A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-5162.
The severity of CVE-2019-5162 is critical with a score of 8.8.
The affected software for CVE-2019-5162 is Moxa AWK-3131A firmware version 1.13.
This vulnerability can be exploited by using a specially crafted user name entry to overwrite an existing user account password, resulting in remote shell access to the device.
It is recommended to update to a version of Moxa AWK-3131A firmware that is not affected by this vulnerability.