A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change.
References
Link | Resource |
---|---|
https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-105.md | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-03T14:50:10
Updated: 2019-07-03T14:50:09
Reserved: 2018-05-24T00:00:00
Link: CVE-2018-11426
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-03T15:15:10.537
Modified: 2019-07-10T14:33:27.907
Link: CVE-2018-11426
JSON object: View
Redhat Information
No data.
CWE