Lucene search

K
saintSAINT CorporationSAINT:D0A1387A2748B654BA454370AF030B20
HistoryFeb 27, 2020 - 12:00 a.m.

Moxa AWK-3131A iw_console privilege escalation vulnerability

2020-02-2700:00:00
SAINT Corporation
my.saintcorporation.com
63

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

44.2%

Added: 02/27/2020
CVE: CVE-2019-5136

Background

Moxa AWK-3131A is a 3-in-1 industrial wireless AP/bridge/client device.

Problem

A privilege escalation vulnerability exists in the iw_console functionality where a specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user.

Resolution

Contact Moxa Technical Support to get the security patch.

References

<https://www.moxa.com/en/support/support/security-advisory/awk-3131a-series-industrial-ap-bridge-client-vulnerabilities&gt;

Limitations

This exploit will only work if the default admin password hasn’t been changed.

Platforms

Moxa

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

44.2%

Related for SAINT:D0A1387A2748B654BA454370AF030B20