Moxa AWK-3121 Cross-Site Request Forgery (CVE-2018-10696)

high Tenable OT Security Plugin ID 501508

Synopsis

The remote OT asset is affected by a vulnerability.

Description

An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a web interface to allow an administrator to manage the device. However, this interface is not protected against CSRF attacks, which allows an attacker to trick an administrator into executing actions without his/her knowledge, as demonstrated by the forms/iw_webSetParameters and forms/webSetMainRestart URIs.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

Moxa notes this device has reached end of life and has been replaced by model AWK-1131A (see Moxa bulletin). Moxa recommends users apply the latest security patch, which can be obtained by contacting customer service at the following link:

https://www.moxa.com/en/support/support/technical-support

For additional information see the Moxa advisory.

See Also

http://www.nessus.org/u?8cdebb36

http://www.nessus.org/u?1bb1138e

https://seclists.org/bugtraq/2019/Jun/8

https://www.cisa.gov/news-events/ics-advisories/icsa-19-337-02

Plugin Details

Severity: High

ID: 501508

Version: 1.6

Type: remote

Family: Tenable.ot

Published: 8/2/2023

Updated: 9/4/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-10696

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:moxa:awk-3121_firmware:1.14

Required KB Items: Tenable.ot/Moxa

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/7/2019

Vulnerability Publication Date: 6/7/2019

Reference Information

CVE: CVE-2018-10696

CWE: 352

ICSA: 19-337-02