Description
The affected products contain vulnerable firmware, which could allow an attacker to sniff the traffic and decrypt login credential details. This could give an attacker admin rights through the HTTP web server.
No analysis available yet.
Remediation
Vendor Solution
Moxa has developed the following mitigations to address this vulnerability. Enable ‘HTTPS’ and disable the HTTP console function under ‘Console Settings’ Moxa also recommends users refer to Tech Note: Moxa Security Hardening Guide for MGate MB3000 Series
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-34029 | The affected products contain vulnerable firmware, which could allow an attacker to sniff the traffic and decrypt login credential details. This could give an attacker admin rights through the HTTP web server. |
References
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-21-357-01 |
|
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-16T19:24:13.483Z
Reserved: 2021-12-23T00:00:00.000Z
Link: CVE-2021-4161
No data.
Status : Modified
Published: 2021-12-27T19:15:08.803
Modified: 2024-11-21T06:37:02.533
Link: CVE-2021-4161
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD