Moxa AWK-3121 Cleartext Transmission of Sensitive Information (CVE-2018-10694)

high Tenable OT Security Plugin ID 501493

Synopsis

The remote OT asset is affected by a vulnerability.

Description

An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a Wi-Fi connection that is open and does not use any encryption mechanism by default. An administrator who uses the open wireless connection to set up the device can allow an attacker to sniff the traffic passing between the user's computer and the device.
This can allow an attacker to steal the credentials passing over the HTTP connection as well as TELNET traffic. Also an attacker can MITM the response and infect a user's computer very easily as well.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

Moxa notes this device has reached end of life and has been replaced by model AWK-1131A (see Moxa bulletin). Moxa recommends users apply the latest security patch, which can be obtained by contacting customer service at the following link:

https://www.moxa.com/en/support/support/technical-support

For additional information see the Moxa advisory.

See Also

http://www.nessus.org/u?1bb1138e

https://seclists.org/bugtraq/2019/Jun/8

http://www.nessus.org/u?8cdebb36

https://www.cisa.gov/news-events/ics-advisories/icsa-19-337-02

Plugin Details

Severity: High

ID: 501493

Version: 1.5

Type: remote

Family: Tenable.ot

Published: 8/2/2023

Updated: 9/4/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2018-10694

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:moxa:awk-3121_firmware:1.14

Required KB Items: Tenable.ot/Moxa

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/7/2019

Vulnerability Publication Date: 6/7/2019

Reference Information

CVE: CVE-2018-10694

CWE: 311

ICSA: 19-337-02