First published: Tue Feb 07 2023(Updated: )
A cleartext transmission vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Sds-3008 Firmware | <=2.1 | |
Moxa SDS-3008 | ||
Moxa Sds-3008-t Firmware | <=2.1 | |
Moxa Sds-3008-t |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Moxa SDS-3008 vulnerability is CVE-2022-40693.
The severity level of CVE-2022-40693 is high with a severity value of 7.5.
The affected software for CVE-2022-40693 is Moxa SDS-3008 Series Industrial Ethernet Switch 2.1.
An attacker can exploit CVE-2022-40693 by sniffing network traffic to trigger the vulnerability and disclose sensitive information.
Yes, you can find references for CVE-2022-40693 at the following URLs: [Reference 1](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1616) and [Reference 2](https://www.moxa.com/en/support/product-support/security-advisory/sds-3008-series-multiple-web-vulnerabilities).