First published: Sat Sep 02 2023(Updated: )
A vulnerability has been identified in MXsecurity versions prior to v1.0.1. The vulnerability may put the confidentiality and integrity of SSH communications at risk on the affected device. This vulnerability is attributed to a hard-coded SSH host key, which might facilitate man-in-the-middle attacks and enable the decryption of SSH traffic.
Credit: psirt@moxa.com psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa MXsecurity Series | <=1.0.1 |
Moxa has developed appropriate solution to address the vulnerability. The solution for affected product is shown below. * MXsecurity: Please upgrade to software v1.1.0 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39982 is a vulnerability in MXsecurity versions prior to v1.0.1 that puts the confidentiality and integrity of SSH communications at risk.
CVE-2023-39982 affects the affected device by exposing it to potential man-in-the-middle attacks due to a hard-coded SSH host key.
CVE-2023-39982 has a severity level of high, with a CVSS score of 5.9.
To fix CVE-2023-39982, update your MXsecurity software to version 1.0.1 or higher.
You can find more information about CVE-2023-39982 in the Moxa Security Advisory at https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities.