First published: Sat Dec 23 2023(Updated: )
A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization.
Credit: psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Moxa Iologik E1210 Firmware | <3.3 | |
Moxa ioLogik E1210 | ||
All of | ||
Moxa Iologik E1211 Firmware | <3.3 | |
Moxa Iologik E1211 | ||
All of | ||
Moxa Iologik E1212 Firmware | <3.3 | |
Moxa Iologik E1212 | ||
All of | ||
Moxa Iologik E1213 Firmware | <3.3 | |
Moxa Iologik E1213 | ||
All of | ||
Moxa Iologik E1214 Firmware | <3.3 | |
Moxa Iologik E1214 | ||
All of | ||
Moxa Iologik E1240 Firmware | <3.3 | |
Moxa Iologik E1240 | ||
All of | ||
Moxa Iologik E1241 Firmware | <3.3 | |
Moxa Iologik E1241 | ||
All of | ||
Moxa Iologik E1242 Firmware | <3.3 | |
Moxa Iologik E1242 | ||
All of | ||
Moxa Iologik E1260 Firmware | <3.3 | |
Moxa Iologik E1260 | ||
All of | ||
Moxa Iologik E1262 Firmware | <3.3 | |
Moxa Iologik E1262 |
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below. * ioLogik E1200 Series : Please contact Moxa Technical Support for the security patch (v3.3.7). https://www.moxa.com/tw/support/technical-support
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.