A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-58233 | A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization. |
Fixes
Solution
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below. * ioLogik E1200 Series : Please contact Moxa Technical Support for the security patch (v3.3.7). https://www.moxa.com/tw/support/technical-support
Workaround
No workaround given by the vendor.
References
History
Mon, 28 Oct 2024 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization. | A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization. |
Weaknesses | CWE-328 |

Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2024-10-28T06:14:46.184Z
Reserved: 2023-11-06T07:47:33.243Z
Link: CVE-2023-5962

No data.

Status : Modified
Published: 2023-12-23T09:15:08.050
Modified: 2024-11-21T08:42:52.350
Link: CVE-2023-5962

No data.

No data.