Vulnerability Description
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "srvName" is susceptible to a buffer overflow. By crafting a packet that contains a string of 516 characters, it is possible for an attacker to execute the attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Moxa | Awk-3121 Firmware | 1.14 |
| Moxa | Awk-3121 | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Discl
- https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121ExploitThird Party Advisory
- https://seclists.org/bugtraq/2019/Jun/8Mailing ListThird Party Advisory
- http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Discl
- https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121ExploitThird Party Advisory
- https://seclists.org/bugtraq/2019/Jun/8Mailing ListThird Party Advisory
FAQ
What is CVE-2018-10693?
CVE-2018-10693 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered on Moxa AWK-3121 1.14 devices. It provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same fu...
How severe is CVE-2018-10693?
CVE-2018-10693 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10693?
Check the references section above for vendor advisories and patch information. Affected products include: Moxa Awk-3121 Firmware, Moxa Awk-3121.