First published: Tue Mar 05 2019(Updated: )
Moxa IKS and EDS does not properly check authority on server side, which results in a read-only user being able to perform arbitrary configuration changes.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Iks-g6824a Firmware | <=4.5 | |
Moxa IKS-G6824A | ||
Moxa Eds-405a Firmware | <=3.8 | |
Moxa EDS-405A | ||
Moxa Eds-408a Firmware | <=3.8 | |
Moxa Eds-408a | ||
Moxa Eds-510a Firmware | <=3.8 | |
Moxa Eds-510a | ||
All of | ||
Moxa Iks-g6824a Firmware | <=4.5 | |
Moxa IKS-G6824A | ||
All of | ||
Moxa Eds-405a Firmware | <=3.8 | |
Moxa EDS-405A | ||
All of | ||
Moxa Eds-408a Firmware | <=3.8 | |
Moxa Eds-408a | ||
All of | ||
Moxa Eds-510a Firmware | <=3.8 | |
Moxa Eds-510a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6520 is classified as a moderate severity vulnerability due to improper authorization checks.
To fix CVE-2019-6520, update your Moxa IKS and EDS devices to the latest firmware version beyond 4.5 for IKS and 3.8 for EDS firmware.
CVE-2019-6520 affects Moxa IKS-G6824A firmware versions up to 4.5 and Moxa EDS-405A, EDS-408A, and EDS-510A firmware versions up to 3.8.
Yes, a read-only user can exploit CVE-2019-6520 to make arbitrary configuration changes due to insufficient authorization checks.
Exploitation of CVE-2019-6520 may allow unauthorized users to modify device configurations, potentially leading to operational disruptions.