First published: Wed Dec 23 2020(Updated: )
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has incorrectly implemented protections from session fixation, which may allow an attacker to gain access to a session and hijack it by stealing the user’s cookies.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Nport Iaw5000a-i\/o Firmware | <=2.1 | |
Moxa Nport Iaw5000a-i\/o | ||
MOXA NPort: Firmware Version 2.1 or lower |
Moxa has released an updated firmware version (https://www.moxa.com/en/support/product-support/software-and-documentation/search?psid=50535) for the NPort IAW5000A-I/O Series and recommends (https://www.moxa.com/en/support/support/security-advisory/nport-iaw5000a-io-serial-device-servers-vulnerabilities) users install this update on all affected systems.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25198 is considered to be of medium severity due to the potential for session hijacking.
To fix CVE-2020-25198, upgrade the NPort IAW5000A-I/O firmware to a version higher than 2.1.
CVE-2020-25198 affects Moxa NPort IAW5000A-I/O firmware version 2.1 and lower.
CVE-2020-25198 allows an attacker to perform session fixation attacks, potentially hijacking user sessions.
Yes, CVE-2020-25198 has an official advisory detailing the vulnerability and its implications.