First published: Tue Mar 05 2019(Updated: )
Moxa IKS and EDS generate a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator's password, which could lead to a full compromise of the device.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Iks-g6824a Firmware | <=4.5 | |
Moxa IKS-G6824A | ||
Moxa Eds-405a Firmware | <=3.8 | |
Moxa EDS-405A | ||
Moxa Eds-408a Firmware | <=3.8 | |
Moxa Eds-408a | ||
Moxa Eds-510a Firmware | <=3.8 | |
Moxa Eds-510a | ||
All of | ||
Moxa Iks-g6824a Firmware | <=4.5 | |
Moxa IKS-G6824A | ||
All of | ||
Moxa Eds-405a Firmware | <=3.8 | |
Moxa EDS-405A | ||
All of | ||
Moxa Eds-408a Firmware | <=3.8 | |
Moxa Eds-408a | ||
All of | ||
Moxa Eds-510a Firmware | <=3.8 | |
Moxa Eds-510a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6563 is rated as a high severity vulnerability due to the potential for an attacker to capture an administrator's password.
To fix CVE-2019-6563, update your Moxa IKS and EDS devices to firmware version higher than 4.5 for IKS-G6824A and 3.8 for the EDS series.
CVE-2019-6563 affects Moxa IKS-G6824A firmware versions up to 4.5 and Moxa EDS-405A, EDS-408A, and EDS-510A firmware versions up to 3.8.
Exploitation of CVE-2019-6563 could lead to a total compromise of affected Moxa devices, allowing unauthorized control over network operations.
At the time of discovery, there were no confirmed incidents of active exploitation for CVE-2019-6563, but the vulnerability's nature poses serious risks.