Eugenie Potseluevskaya

4 exploits Active since Jul 2019
CVE-2018-11421 WRITEUP CRITICAL WRITEUP
Moxa Oncell G3150-hspa Firmware < 1.6 - Cleartext Transmission
Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary monitoring protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. The protocol is vulnerable to remote unauthenticated disclosure of sensitive information, including the administrator's password. Under certain conditions, it's also possible to retrieve additional information, such as content of HTTP requests to the device, or the previously used password, due to memory leakages.
CVSS 9.8
CVE-2018-11422 WRITEUP CRITICAL WRITEUP
Moxa Oncell G3150-hspa Firmware < 1.6 - Cleartext Transmission
Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary configuration protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. Any commands (including device reboot, configuration download or upload, or firmware upgrade) are accepted and executed by the device without authentication.
CVSS 9.8
CVE-2018-11426 WRITEUP CRITICAL WRITEUP
Moxa Oncell G3150-hspa Firmware < 1.4 - Authentication Bypass
A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change.
CVSS 9.8
CVE-2018-11427 WRITEUP HIGH WRITEUP
Moxa Oncell G3150-hspa Firmware < 1.4 - CSRF
CSRF tokens are not used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior, which makes it possible to perform CSRF attacks on the device administrator.
CVSS 8.8