cve/2017/CVE-2017-13699.md

18 lines
806 B
Markdown
Raw Normal View History

2024-07-25 21:25:12 +00:00
### [CVE-2017-13699](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13699)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The password encryption method can be retrieved from the firmware. This encryption method is based on a chall value that is sent in cleartext as a POST parameter. An attacker could reverse the password encryption algorithm to retrieve it.
### POC
#### Reference
- https://www.sentryo.net/wp-content/uploads/2017/11/Switch-Moxa-Analysis.pdf
#### Github
No PoCs found on GitHub currently.