Описание
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has incorrectly implemented protections from session fixation, which may allow an attacker to gain access to a session and hijack it by stealing the user’s cookies.
Ссылки
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 2.1 (включая)
Одновременно
cpe:2.3:o:moxa:nport_iaw5000a-i\/o_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_iaw5000a-i\/o:-:*:*:*:*:*:*:*
EPSS
Процентиль: 41%
0.00189
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-384
CWE-384
Связанные уязвимости
github
больше 3 лет назад
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has incorrectly implemented protections from session fixation, which may allow an attacker to gain access to a session and hijack it by stealing the user’s cookies.
EPSS
Процентиль: 41%
0.00189
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-384
CWE-384