Vulnerability Description
The GoAhead web server on Moxa EDS-405A and EDS-408A switches with firmware before 3.6 allows remote authenticated users to cause a denial of service (reboot) via a crafted URL.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Moxa | Eds-405A Firmware | <= 3.4 |
| Moxa | Eds-408A Firmware | <= 3.4 |
| Moxa | Eds-405A | - |
| Moxa | Eds-408A | - |
References
- http://www.moxa.com/support/download.aspx?type=support&id=328Patch
- http://www.securitytracker.com/id/1033543
- https://ics-cert.us-cert.gov/advisories/ICSA-15-246-03Third Party AdvisoryUS Government Resource
- http://www.moxa.com/support/download.aspx?type=support&id=328Patch
- http://www.securitytracker.com/id/1033543
- https://ics-cert.us-cert.gov/advisories/ICSA-15-246-03Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2015-6465?
CVE-2015-6465 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The GoAhead web server on Moxa EDS-405A and EDS-408A switches with firmware before 3.6 allows remote authenticated users to cause a denial of service (reboot) via a crafted URL.
How severe is CVE-2015-6465?
CVE-2015-6465 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-6465?
Check the references section above for vendor advisories and patch information. Affected products include: Moxa Eds-405A Firmware, Moxa Eds-408A Firmware, Moxa Eds-405A, Moxa Eds-408A.