Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Severity
High
Analysis Summary
Following remotely exploitable vulnerabilities have been found in MOXA’s IKS and EDS equipment.
Vulnerabilities:
CVE-2019-6557:
Classic Buffer Overflow Several buffer overflow vulnerabilities have been identified, which may allow remote code execution.
CVE-2019-6561:
Cross-site Request Forgery A cross-site request forgery has been identified, which may allow for the execution of unauthorized actions on the device.
CVE-2019-6565:
Cross-site Scripting The device fails to properly validate user input, giving unauthenticated and authenticated attackers the ability to perform XSS attacks, which may be used to send a malicious script.
CVE-2019-6520:
Improper Access Controls The device does not properly check authority on server side, which results in a read-only user being able to perform arbitrary configuration changes.
CVE-2019-6524:
Improper Restriction of Excessive Authentication Attempts The devices do not implement sufficient measures to prevent multiple failed authentication attempts, which may allow an attacker to discover passwords via brute force attack.
CVE-2019-6526:
Missing Encryption of Sensitive Data The devices use plaintext transmission of sensitive data, which may allow an attacker to capture sensitive data such as an administrative password.
CVE-2019-6522:
Out-of-bounds Read, Failure to properly check array bounds may allow an attacker to read device memory on arbitrary addresses, which may allow an attacker to retrieve sensitive data or cause device reboot.
CVE-2019-6518:
Unprotected Storage of Credentials The devices store plaintext passwords, which may allow sensitive information to be read by someone with access to the device.
CVE-2019-6563:
Predictable from Observable State The software generates a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator’s password, which could lead to a full compromise of the device.
CVE-2019-6559:
Uncontrolled Resource Consumption The devices allow remote authenticated users to cause a denial of service via a specially crafted packet, which may cause the switch to crash.
Impact
Affected Vendors
Moxa
Affected Products
Remediation
Moxa recommends that users implement the following measures to mitigate these vulnerabilities.