Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-17887 | The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower allows SSH/Telnet sessions, which may be vulnerable to brute force attacks to bypass authentication. |
Solution
Moxa has released an updated firmware version (https://www.moxa.com/en/support/product-support/software-and-documentation/search?psid=50535) for the NPort IAW5000A-I/O Series and recommends (https://www.moxa.com/en/support/support/security-advisory/nport-iaw5000a-io-serial-device-servers-vulnerabilities) users install this update on all affected systems.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://us-cert.cisa.gov/ics/advisories/icsa-20-287-01 |
|
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-17T00:37:03.186Z
Reserved: 2020-09-04T00:00:00
Link: CVE-2020-25196
No data.
Status : Modified
Published: 2020-12-23T15:15:15.807
Modified: 2024-11-21T05:17:37.120
Link: CVE-2020-25196
No data.
OpenCVE Enrichment
No data.
EUVD