CVE-2018-11421

Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary monitoring protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. The protocol is vulnerable to remote unauthenticated disclosure of sensitive information, including the administrator's password. Under certain conditions, it's also possible to retrieve additional information, such as content of HTTP requests to the device, or the previously used password, due to memory leakages.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:moxa:oncell_g3150-hspa_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:oncell_g3150-hspa:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:moxa:oncell_g3150-hspa-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:oncell_g3150-hspa-t:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-07-03 16:15

Updated : 2024-11-21 03:43


NVD link : CVE-2018-11421

Mitre link : CVE-2018-11421

CVE.ORG link : CVE-2018-11421


JSON object : View

Products Affected

moxa

  • oncell_g3150-hspa
  • oncell_g3150-hspa-t_firmware
  • oncell_g3150-hspa_firmware
  • oncell_g3150-hspa-t
CWE
CWE-319

Cleartext Transmission of Sensitive Information