Product:

Eds\-G516e_firmware

(Moxa)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 7
Date Id Summary Products Score Patch Annotated
2020-03-24 CVE-2020-6979 In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered. Eds\-510e_firmware, Eds\-G516e_firmware 7.5
2020-03-24 CVE-2020-6981 In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system without proper authentication. Eds\-510e_firmware, Eds\-G516e_firmware 9.8
2020-03-24 CVE-2020-6997 In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext. Eds\-510e_firmware, Eds\-G516e_firmware 7.5
2020-03-24 CVE-2020-6991 In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force. Eds\-510e_firmware, Eds\-G516e_firmware 9.8
2020-03-24 CVE-2020-7001 In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed. Eds\-510e_firmware, Eds\-G516e_firmware 7.5
2020-03-24 CVE-2020-7007 In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or target the device, causing it to go out of service. Eds\-510e_firmware, Eds\-G516e_firmware 9.8
2019-12-11 CVE-2019-19707 On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets. Eds\-G508e_firmware, Eds\-G512e_firmware, Eds\-G516e_firmware N/A