Vulnerabilities (CVE)

Filtered by vendor Moxa Subscribe
Filtered by product Eds-g512e
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-19707 1 Moxa 6 Eds-g508e, Eds-g508e Firmware, Eds-g512e and 3 more 2023-12-10 7.8 HIGH 7.5 HIGH
On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets.
CVE-2017-13702 1 Moxa 2 Eds-g512e, Eds-g512e Firmware 2023-12-10 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. Cookies can be stolen, manipulated, and reused.
CVE-2017-13699 1 Moxa 2 Eds-g512e, Eds-g512e Firmware 2023-12-10 5.0 MEDIUM 7.5 HIGH
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The password encryption method can be retrieved from the firmware. This encryption method is based on a chall value that is sent in cleartext as a POST parameter. An attacker could reverse the password encryption algorithm to retrieve it.
CVE-2017-13701 1 Moxa 2 Eds-g512e, Eds-g512e Firmware 2023-12-10 5.0 MEDIUM 9.8 CRITICAL
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The backup file contains sensitive information in a insecure way. There is no salt for password hashing. Indeed passwords are stored without being ciphered with a timestamped ciphering method.
CVE-2017-13703 1 Moxa 2 Eds-g512e, Eds-g512e Firmware 2023-12-10 7.8 HIGH 7.5 HIGH
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. A denial of service may occur.
CVE-2017-13698 1 Moxa 2 Eds-g512e, Eds-g512e Firmware 2023-12-10 5.0 MEDIUM 7.5 HIGH
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. An attacker could extract public and private keys from the firmware image available on the MOXA website and could use them against a production switch that has the default keys embedded.
CVE-2017-13700 1 Moxa 2 Eds-g512e, Eds-g512e Firmware 2023-12-10 3.5 LOW 4.8 MEDIUM
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. There is XSS in the administration interface.