CRITICAL · 9.8

CVE-2019-6526

Moxa IKS-G6824A series Versions 4.5 and prior, EDS-405A series Version 3.8 and prior, EDS-408A series Version 3.8 and prior, and EDS-510A series Version 3.8 and prior use plaintext transmission of sen...

Vulnerability Description

Moxa IKS-G6824A series Versions 4.5 and prior, EDS-405A series Version 3.8 and prior, EDS-408A series Version 3.8 and prior, and EDS-510A series Version 3.8 and prior use plaintext transmission of sensitive data, which may allow an attacker to capture sensitive data such as an administrative password.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
MoxaIks-G6824A Firmware<= 4.5
MoxaIks-G6824A-
MoxaEds-405A Firmware<= 3.8
MoxaEds-405A-
MoxaEds-408A Firmware<= 3.8
MoxaEds-408A-
MoxaEds-510A Firmware<= 3.8
MoxaEds-510A-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-6526?

CVE-2019-6526 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Moxa IKS-G6824A series Versions 4.5 and prior, EDS-405A series Version 3.8 and prior, EDS-408A series Version 3.8 and prior, and EDS-510A series Version 3.8 and prior use plaintext transmission of sen...

How severe is CVE-2019-6526?

CVE-2019-6526 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2019-6526?

Check the references section above for vendor advisories and patch information. Affected products include: Moxa Iks-G6824A Firmware, Moxa Iks-G6824A, Moxa Eds-405A Firmware, Moxa Eds-405A, Moxa Eds-408A Firmware.