First published: Tue Mar 05 2019(Updated: )
Moxa IKS and EDS do not implement sufficient measures to prevent multiple failed authentication attempts, which may allow an attacker to discover passwords via brute force attack.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa IKS-G6824A Firmware | <=4.5 | |
Moxa IKS-G6824A Firmware | ||
Moxa EDS-405A Firmware | <=3.8 | |
Moxa Eds-405A Firmware | ||
Moxa EDS-408A | <=3.8 | |
Moxa Eds-408A Firmware | ||
Moxa EDS-510A Firmware | <=3.8 | |
Moxa EDS-510A Firmware | ||
All of | ||
Moxa IKS-G6824A Firmware | <=4.5 | |
Moxa IKS-G6824A Firmware | ||
All of | ||
Moxa EDS-405A Firmware | <=3.8 | |
Moxa Eds-405A Firmware | ||
All of | ||
Moxa EDS-408A | <=3.8 | |
Moxa Eds-408A Firmware | ||
All of | ||
Moxa EDS-510A Firmware | <=3.8 | |
Moxa EDS-510A Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6524 has a medium severity rating as it allows attackers to perform brute force attacks due to insufficient failed authentication attempt controls.
To mitigate CVE-2019-6524, implement account lockout policies to limit failed authentication attempts and regularly update passwords to complex configurations.
CVE-2019-6524 affects Moxa IKS-G6824A and various EDS firmware versions up to 4.5 and 3.8 respectively.
Yes, CVE-2019-6524 can be exploited remotely as an attacker may perform brute force attacks over the network.
There is no specific patch mentioned for CVE-2019-6524, but security best practices should be followed to mitigate risks.