CVE-2020-6991
- EPSS 0.39%
- Veröffentlicht 24.03.2020 21:15:15
- Zuletzt bearbeitet 21.11.2024 05:36:26
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force.
CVE-2020-6997
- EPSS 0.2%
- Veröffentlicht 24.03.2020 21:15:15
- Zuletzt bearbeitet 21.11.2024 05:36:27
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext.
CVE-2020-7001
- EPSS 0.2%
- Veröffentlicht 24.03.2020 21:15:15
- Zuletzt bearbeitet 21.11.2024 05:36:28
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed.
- EPSS 0.55%
- Veröffentlicht 24.03.2020 21:15:15
- Zuletzt bearbeitet 21.11.2024 05:36:28
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or target the device, causing it to go out of service.
CVE-2020-6979
- EPSS 0.38%
- Veröffentlicht 24.03.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:36:25
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered.
- EPSS 0.39%
- Veröffentlicht 24.03.2020 21:15:14
- Zuletzt bearbeitet 21.11.2024 05:36:25
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system without proper authentication.
CVE-2019-19707
- EPSS 0.56%
- Veröffentlicht 11.12.2019 02:15:14
- Zuletzt bearbeitet 21.11.2024 04:35:14
On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets.