- Description
- Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.6
- Impact score
- 10
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:C/I:C/A:C
- nvd@nist.gov
- CWE-310
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:moxa:edr_g903_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "073FFA29-3EA2-4A26-8381-9667B3F28A77",
"versionEndIncluding": "2.2"
},
{
"criteria": "cpe:2.3:a:moxa:edr_g903_firmware:1.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "801FAD11-D12C-4B2B-8469-07409254E2AB"
},
{
"criteria": "cpe:2.3:a:moxa:edr_g903_firmware:2.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0C58E1CB-D824-4ED0-9CD1-6DA14092F5E2"
},
{
"criteria": "cpe:2.3:a:moxa:edr_g903_firmware:2.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B629626D-56E2-4D72-BED0-7729B8365DE1"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]