First published: Wed Dec 23 2020(Updated: )
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower allows SSH/Telnet sessions, which may be vulnerable to brute force attacks to bypass authentication.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Nport Iaw5000a-i\/o Firmware | <=2.1 | |
Moxa Nport Iaw5000a-i\/o | ||
MOXA NPort: Firmware Version 2.1 or lower |
Moxa has released an updated firmware version (https://www.moxa.com/en/support/product-support/software-and-documentation/search?psid=50535) for the NPort IAW5000A-I/O Series and recommends (https://www.moxa.com/en/support/support/security-advisory/nport-iaw5000a-io-serial-device-servers-vulnerabilities) users install this update on all affected systems.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25196 is considered to be of high severity due to the potential for brute force attacks that can lead to unauthorized access.
To fix CVE-2020-25196, upgrade the firmware of the Moxa NPort IAW5000A-I/O to a version above 2.1.
CVE-2020-25196 affects the Moxa NPort IAW5000A-I/O firmware version 2.1 and lower.
CVE-2020-25196 introduces vulnerabilities that may allow attackers to bypass authentication via SSH/Telnet.
There are currently no specific public exploits documented for CVE-2020-25196, but the vulnerability poses a risk of brute force attacks.