Moxa Moxa AWK-3131A Wireless AP/Bridge/Client Vulnerabilities
Multiple vulnerabilities were identified in Moxa AWK-3131A Series Wireless AP/Bridge/Client devices affecting all versions. The vulnerabilities include: (1) nonce reuse allowing session token replay (CVE-2016-8712), (2) cleartext password transmission over web console enabling credential theft (CVE-2016-8716), (3) hardcoded administrator credentials that cannot be modified or removed (CVE-2016-8717), (4) CSRF vulnerabilities allowing authenticated users to execute arbitrary commands (CVE-2016-8718), (5) reflected XSS vulnerabilities in the web interface (CVE-2016-8719), (6) HTTP header injection (CVE-2016-8720), (7) ping command injection enabling arbitrary command execution (CVE-2016-8721), (8) information disclosure through specific URLs accessible to unauthorized users (CVE-2016-8722), and (9) denial of service vulnerability. Moxa has stated no patch will be released for these devices. These vulnerabilities allow remote attackers to intercept credentials, gain unauthorized administrative access, execute arbitrary commands on the device, and disrupt its operation.
- Network access to the web console (HTTP/HTTPS port)
- For password interception: ability to monitor network traffic to the device
- For hardcoded credentials attack: no special privileges needed
- For command injection: authenticated session or ability to craft CSRF requests from an authenticated user's browser
/api/v1/advisories/bb1f0625-1bc8-4d86-b093-ca0b8e0ad51f