Moxa

Awk-3121 Firmware

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.26%
  • Veröffentlicht 07.06.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:51

An issue was discovered on Moxa AWK-3121 1.14 devices. The device by default allows HTTP traffic thus providing an insecure communication mechanism for a user connecting to the web server. This allows an attacker to sniff the traffic easily and allow...

Exploit
  • EPSS 0.89%
  • Veröffentlicht 07.06.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:51

An issue was discovered on Moxa AWK-3121 1.14 devices. It is intended that an administrator can download /systemlog.log (the system log). However, the same functionality allows an attacker to download the file without any authentication or authorizat...

Exploit
  • EPSS 0.41%
  • Veröffentlicht 07.06.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:51

An issue was discovered on Moxa AWK-3121 1.14 devices. The session cookie "Password508" does not have an HttpOnly flag. This allows an attacker who is able to execute a cross-site scripting attack to steal the cookie very easily.

Exploit
  • EPSS 0.69%
  • Veröffentlicht 07.06.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:51

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same functionality allows an attacker to execute commands...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 07.06.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:51

An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a Wi-Fi connection that is open and does not use any encryption mechanism by default. An administrator who uses the open wireless connection to set up the device can allow an ...

Exploit
  • EPSS 0.61%
  • Veröffentlicht 07.06.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:52

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides alert functionality so that an administrator can send emails to his/her account when there are changes to the device's network. However, the same functionality allows an attacker to e...

Exploit
  • EPSS 0.25%
  • Veröffentlicht 07.06.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:52

An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a web interface to allow an administrator to manage the device. However, this interface is not protected against CSRF attacks, which allows an attacker to trick an administrat...

Exploit
  • EPSS 0.85%
  • Veröffentlicht 07.06.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:52

An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same functionality allows an attacker to e...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 07.06.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:52

An issue was discovered on Moxa AWK-3121 1.14 devices. The device enables an unencrypted TELNET service by default. This allows an attacker who has been able to gain an MITM position to easily sniff the traffic between the device and the user. Also a...

Exploit
  • EPSS 0.55%
  • Veröffentlicht 07.06.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:52

An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides certfile upload functionality so that an administrator can upload a certificate file used for connecting to the wireless network. However, the same functionality allows...