SB2020022608 - Multiple vulnerabilities in Moxa EDS-G516E and EDS-510E Series Ethernet Switches



SB2020022608 - Multiple vulnerabilities in Moxa EDS-G516E and EDS-510E Series Ethernet Switches

Published: February 26, 2020

Security Bulletin ID SB2020022608
Severity
High
Patch available
NO
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 29% Medium 57% Low 14%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2020-7007)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the web setting page IEEE802.1x setting page. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code or cause a denial of service (DoS) condition on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2020-7001)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the affected products use a weak cryptographic algorithm. A remote attacker can gain unauthorized access to sensitive information on the system.


3) Use of Hard-coded Cryptographic Key (CVE-ID: CVE-2020-6979)

The vulnerability allows a remote attacker to disclose sensitive information on the target system.

The vulnerability exists due to the affected products use a hard-coded cryptographic key. A remote attacker can obtain the key and recover the confidential data.

4) Use of hard-coded credentials (CVE-ID: CVE-2020-6981)

The vulnerability allows a remote attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker can access the affected system using the hard-coded credentials.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Cleartext transmission of sensitive information (CVE-ID: CVE-2020-6997)

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote user with ability to intercept network traffic can gain access to sensitive data.


6) Weak password requirements (CVE-ID: CVE-2020-6991)

The vulnerability allows an attacker to perform brute-force attack and guess the password.

The vulnerability exists due to weak password requirements. An attacker can perform a brute-force attack and guess users' passwords.


7) Buffer overflow (CVE-ID: CVE-2020-6989)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to some of the parameters in the setting pages do not ensure text is the correct size for its buffer. A remote authenticated attacker can trigger memory corruption and cause a denial of service condition on the target system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.