SB2020022607 - Multiple vulnerabilities in Moxa PT-7528 and PT-7828 Series Ethernet Switches
Published: February 26, 2020 Updated: February 26, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2020-6989)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the web server. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code or cause a denial of service (DoS) condition on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2020-6987)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the affected products use a weak cryptographic algorithm. A remote attacker can gain unauthorized access to sensitive information on the system.
3) Use of Hard-coded Cryptographic Key (CVE-ID: CVE-2020-6983)
4) Use of hard-coded credentials (CVE-ID: CVE-2020-6985)
The vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker can access the affected system using the hard-coded credentials for access to the console.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Weak password requirements (CVE-ID: CVE-2020-6995)
The vulnerability allows an attacker to perform brute-force attack and guess the password.
The vulnerability exists due to weak password requirements. An attacker can perform a brute-force attack and guess users' passwords.
6) Information disclosure (CVE-ID: CVE-2020-6993)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to improper access restrictions in the web service. A remote attacker can gain unauthorized access to sensitive information on the system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.