Vulnerability Description
An issue was discovered on Moxa AWK-3121 1.14 devices. It is intended that an administrator can download /systemlog.log (the system log). However, the same functionality allows an attacker to download the file without any authentication or authorization.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Moxa | Awk-3121 Firmware | 1.14 |
| Moxa | Awk-3121 | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Discl
- https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121ExploitThird Party Advisory
- https://seclists.org/bugtraq/2019/Jun/8Mailing ListThird Party Advisory
- http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Discl
- https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121ExploitThird Party Advisory
- https://seclists.org/bugtraq/2019/Jun/8Mailing ListThird Party Advisory
FAQ
What is CVE-2018-10691?
CVE-2018-10691 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered on Moxa AWK-3121 1.14 devices. It is intended that an administrator can download /systemlog.log (the system log). However, the same functionality allows an attacker to download...
How severe is CVE-2018-10691?
CVE-2018-10691 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10691?
Check the references section above for vendor advisories and patch information. Affected products include: Moxa Awk-3121 Firmware, Moxa Awk-3121.