Vulnerabilities > Moxa > EDS 510A Firmware > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-04-15 | CVE-2019-6526 | Cleartext Transmission of Sensitive Information vulnerability in Moxa products Moxa IKS-G6824A series Versions 4.5 and prior, EDS-405A series Version 3.8 and prior, EDS-408A series Version 3.8 and prior, and EDS-510A series Version 3.8 and prior use plaintext transmission of sensitive data, which may allow an attacker to capture sensitive data such as an administrative password. | 9.8 |
2019-03-05 | CVE-2019-6522 | Out-of-bounds Read vulnerability in Moxa products Moxa IKS and EDS fails to properly check array bounds which may allow an attacker to read device memory on arbitrary addresses, and may allow an attacker to retrieve sensitive data or cause device reboot. | 9.1 |
2019-03-05 | CVE-2019-6524 | Improper Restriction of Excessive Authentication Attempts vulnerability in Moxa products Moxa IKS and EDS do not implement sufficient measures to prevent multiple failed authentication attempts, which may allow an attacker to discover passwords via brute force attack. | 9.8 |
2019-03-05 | CVE-2019-6557 | Classic Buffer Overflow vulnerability in Moxa products Several buffer overflow vulnerabilities have been identified in Moxa IKS and EDS, which may allow remote code execution. | 9.8 |
2019-03-05 | CVE-2019-6563 | Use of Password Hash With Insufficient Computational Effort vulnerability in Moxa products Moxa IKS and EDS generate a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator's password, which could lead to a full compromise of the device. | 9.8 |