ID CVE-2016-9346
Summary An issue was discovered in Moxa MiiNePort E1 versions prior to 1.8, E2 versions prior to 1.4, and E3 versions prior to 1.1. Configuration data are stored in a file that is not encrypted.
References
Vulnerable Configurations
  • cpe:2.3:o:moxa:miineport_e1_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:moxa:miineport_e1_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:o:moxa:miineport_e2_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:moxa:miineport_e2_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:o:moxa:miineport_e3_firmware:1.0:*:*:*:*:*:*:*
    cpe:2.3:o:moxa:miineport_e3_firmware:1.0:*:*:*:*:*:*:*
  • cpe:2.3:h:moxa:miineport_e1:-:*:*:*:*:*:*:*
    cpe:2.3:h:moxa:miineport_e1:-:*:*:*:*:*:*:*
  • cpe:2.3:h:moxa:miineport_e2:-:*:*:*:*:*:*:*
    cpe:2.3:h:moxa:miineport_e2:-:*:*:*:*:*:*:*
  • cpe:2.3:h:moxa:miineport_e3:-:*:*:*:*:*:*:*
    cpe:2.3:h:moxa:miineport_e3:-:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 23-02-2017 - 19:44)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 94783
misc https://ics-cert.us-cert.gov/advisories/ICSA-16-343-01
Last major update 23-02-2017 - 19:44
Published 13-02-2017 - 21:59
Last modified 23-02-2017 - 19:44
Back to Top