Vulnerability Description
Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary monitoring protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. The protocol is vulnerable to remote unauthenticated disclosure of sensitive information, including the administrator's password. Under certain conditions, it's also possible to retrieve additional information, such as content of HTTP requests to the device, or the previously used password, due to memory leakages.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Moxa | Oncell G3150-Hspa Firmware | <= 1.6 |
| Moxa | Oncell G3150-Hspa | - |
| Moxa | Oncell G3150-Hspa-T Firmware | <= 1.6 |
| Moxa | Oncell G3150-Hspa-T | - |
Related Weaknesses (CWE)
References
- https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-103.mdThird Party Advisory
- https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-103.mdThird Party Advisory
FAQ
What is CVE-2018-11421?
CVE-2018-11421 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary monitoring protocol that does not provide confidentiality, integrity, and authenticity security controls. All infor...
How severe is CVE-2018-11421?
CVE-2018-11421 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-11421?
Check the references section above for vendor advisories and patch information. Affected products include: Moxa Oncell G3150-Hspa Firmware, Moxa Oncell G3150-Hspa, Moxa Oncell G3150-Hspa-T Firmware, Moxa Oncell G3150-Hspa-T.