Логотип exploitDog
bind:CVE-2024-12297
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-12297

Количество 3

Количество 3

nvd логотип

CVE-2024-12297

около 1 года назад

Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.

EPSS: Низкий
github логотип

GHSA-jp78-8mxr-44qr

около 1 года назад

Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.

EPSS: Низкий
fstec логотип

BDU:2025-00371

около 1 года назад

Уязвимость реализации механизма авторизации микропрограммного обеспечения коммутаторов Moxa EDS-508A, позволяющая нарушителю получить несанкционированный доступ к конфигурационным файлам устройства

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-12297

Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.

0%
Низкий
около 1 года назад
github логотип
GHSA-jp78-8mxr-44qr

Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.

0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-00371

Уязвимость реализации механизма авторизации микропрограммного обеспечения коммутаторов Moxa EDS-508A, позволяющая нарушителю получить несанкционированный доступ к конфигурационным файлам устройства

CVSS3: 10
0%
Низкий
около 1 года назад

Уязвимостей на страницу