Product:

Eds\-G512e_firmware

(Moxa)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 7
Date Id Summary Products Score Patch Annotated
2019-12-11 CVE-2019-19707 On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets. Eds\-G508e_firmware, Eds\-G512e_firmware, Eds\-G516e_firmware N/A
2017-11-23 CVE-2017-13698 An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. An attacker could extract public and private keys from the firmware image available on the MOXA website and could use them against a production switch that has the default keys embedded. Eds\-G512e_firmware 7.5
2017-11-17 CVE-2017-13703 An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. A denial of service may occur. Eds\-G512e_firmware 7.5
2017-11-17 CVE-2017-13702 An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. Cookies can be stolen, manipulated, and reused. Eds\-G512e_firmware 5.3
2017-11-23 CVE-2017-13701 An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The backup file contains sensitive information in a insecure way. There is no salt for password hashing. Indeed passwords are stored without being ciphered with a timestamped ciphering method. Eds\-G512e_firmware 9.8
2017-11-17 CVE-2017-13700 An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. There is XSS in the administration interface. Eds\-G512e_firmware 4.8
2017-11-23 CVE-2017-13699 An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The password encryption method can be retrieved from the firmware. This encryption method is based on a chall value that is sent in cleartext as a POST parameter. An attacker could reverse the password encryption algorithm to retrieve it. Eds\-G512e_firmware 7.5