CVE-2018-10696
Summary
| CVE | CVE-2018-10696 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-06-07 20:29:00 UTC |
| Updated | 2019-06-11 14:39:00 UTC |
| Description | An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a web interface to allow an administrator to manage the device. However, this interface is not protected against CSRF attacks, which allows an attacker to trick an administrator into executing actions without his/her knowledge, as demonstrated by the forms/iw_webSetParameters and forms/webSetMainRestart URIs. |
Risk And Classification
Problem Types: CWE-352
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Moxa | Awk-3121 | - | All | All | All |
| Hardware | Moxa | Awk-3121 | - | All | All | All |
| Operating System | Moxa | Awk-3121 Firmware | 1.14 | All | All | All |
| Operating System | Moxa | Awk-3121 Firmware | 1.14 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Moxa AWK-3121 1.14 Information Disclosure / Command Execution ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| Moxa_AWK_1121/Moxa_AWK_1121 at master · samuelhuntley/Moxa_AWK_1121 · GitHub | MISC | github.com | Exploit, Third Party Advisory |
| Bugtraq: Newly releases IoT security issues | BUGTRAQ | seclists.org | Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.