First published: Tue Feb 25 2020(Updated: )
An exploitable authentication bypass vulnerability exists in the hostname processing of the Moxa AWK-3131A firmware version 1.13. A specially configured device hostname can cause the device to interpret select remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa AWK-3131A firmware | =1.13 | |
Moxa AWK-3131A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5165 is an exploitable authentication bypass vulnerability in the Moxa AWK-3131A firmware version 1.13.
CVE-2019-5165 has a severity rating of high (7.2).
CVE-2019-5165 allows an attacker to bypass web authentication by using a specially configured device hostname.
CVE-2019-5165 affects Moxa AWK-3131A firmware version 1.13.
To fix CVE-2019-5165, users should update their Moxa AWK-3131A firmware to a secure version.