CVE-2012-3039
Published Aug 9, 2013
Last updated 11 years ago
Overview
- Description
- Moxa OnCell Gateway G3111, G3151, G3211, and G3251 devices with firmware before 1.4 do not use a sufficient source of entropy for SSH and SSL keys, which makes it easier for remote attackers to obtain access by leveraging knowledge of a key from a product installation elsewhere.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-310
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:oncell_gateway_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "606773F1-69C2-4F26-BAE6-C86D595B8C61", "versionEndIncluding": "1.3" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:oncell_gateway_g3111:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3997D2D0-D82E-478B-84F2-2533A37DA2A2" }, { "criteria": "cpe:2.3:h:moxa:oncell_gateway_g3151:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE779709-BAD2-48EA-A877-291585B8B805" }, { "criteria": "cpe:2.3:h:moxa:oncell_gateway_g3211:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B2E1DBA-A8AC-4B04-8C45-7E123843BB06" }, { "criteria": "cpe:2.3:h:moxa:oncell_gateway_g3251:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "054ADC76-CF74-4D4E-B365-F85E727F6AEA" } ], "operator": "OR" } ], "operator": "AND" } ]