CVE-2012-4694
Published Feb 15, 2013
Last updated 12 years ago
Overview
- Description
- Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.6
- Impact score
- 10
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-310
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:moxa:edr_g903_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "073FFA29-3EA2-4A26-8381-9667B3F28A77", "versionEndIncluding": "2.2" }, { "criteria": "cpe:2.3:a:moxa:edr_g903_firmware:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "801FAD11-D12C-4B2B-8469-07409254E2AB" }, { "criteria": "cpe:2.3:a:moxa:edr_g903_firmware:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C58E1CB-D824-4ED0-9CD1-6DA14092F5E2" }, { "criteria": "cpe:2.3:a:moxa:edr_g903_firmware:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B629626D-56E2-4D72-BED0-7729B8365DE1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96" } ], "operator": "OR" } ], "operator": "AND" } ]