Vulnerabilites related to Moxa - NPort 5200 Series
var-201702-0593
Vulnerability from variot
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Requests are not verified to be intentionally submitted by the proper user (CROSS-SITE REQUEST FORGERY). MOXANport is a serial communication server. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0593", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nport 5200 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5600 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5400 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5x50a1-m12 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.1" }, { "model": "nport 6100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5200a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5100a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5400 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5410", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600-8-dtl series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5630", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650i-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5x50a1-m12 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5150a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5110\u003c2.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5130/5150\u003c3.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5200\u003c2.8" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5400\u003c3.11" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5600\u003c3.7" }, { "model": "nport p5150a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5100a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5200a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5150ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5250ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5450ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600-8-dt", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport 5600-8-dtl", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "6x50\u003c1.13.11" }, { "model": "nport ia5450a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.4" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5400 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5200 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5x50a1-m12 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.1" }, { "model": "nport p5150a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport ia5450a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "6x500" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "64501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "62501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61100" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "60000" }, { "model": "nport 5x50ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-dt/dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-8-dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "56000" }, { "model": "nport 5450ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "54000" }, { "model": "nport 5250ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5200a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "52000" }, { "model": "nport 5150ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51503.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51303.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51102.5" }, { "model": "nport 5100a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51000" }, { "model": "nport ia5450a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "6x501.14" }, { "model": "nport 5600-8-dtl", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5600-8-dt", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "56003.7" }, { "model": "nport 5450ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "54003.11" }, { "model": "nport 5250ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "52002.8" }, { "model": "nport 5150ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51503.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51303.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51102.6" }, { "model": "nport 5100a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11881" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007641" }, { "db": "CNNVD", "id": "CNNVD-201612-034" }, { "db": "NVD", "id": "CVE-2016-9365" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:nport_5100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5100a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5400_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5410", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600-8-dtl_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5630", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650i-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5x50a1-m12_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_6100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_p5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_p5150a_series_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007641" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reid Wightman of Digital Bonds Labs", "sources": [ { "db": "BID", "id": "85965" }, { "db": "CNNVD", "id": "CNNVD-201612-034" } ], "trust": 0.9 }, "cve": "CVE-2016-9365", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2016-9365", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-11881", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-98185", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2016-9365", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-9365", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-9365", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-11881", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201612-034", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-98185", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11881" }, { "db": "VULHUB", "id": "VHN-98185" }, { "db": "JVNDB", "id": "JVNDB-2016-007641" }, { "db": "CNNVD", "id": "CNNVD-201612-034" }, { "db": "NVD", "id": "CVE-2016-9365" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Requests are not verified to be intentionally submitted by the proper user (CROSS-SITE REQUEST FORGERY). MOXANport is a serial communication server. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system", "sources": [ { "db": "NVD", "id": "CVE-2016-9365" }, { "db": "JVNDB", "id": "JVNDB-2016-007641" }, { "db": "CNVD", "id": "CNVD-2016-11881" }, { "db": "BID", "id": "85965" }, { "db": "VULHUB", "id": "VHN-98185" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-9365", "trust": 3.4 }, { "db": "ICS CERT", "id": "ICSA-16-336-02", "trust": 3.4 }, { "db": "BID", "id": "85965", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2016-007641", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-034", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11881", "trust": 0.6 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-16-099-01", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-98185", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11881" }, { "db": "VULHUB", "id": "VHN-98185" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007641" }, { "db": "CNNVD", "id": "CNNVD-201612-034" }, { "db": "NVD", "id": "CVE-2016-9365" } ] }, "id": "VAR-201702-0593", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11881" }, { "db": "VULHUB", "id": "VHN-98185" } ], "trust": 1.592224151 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11881" } ] }, "last_update_date": "2024-11-23T21:54:16.821000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://japan.moxa.com/index.htm" }, { "title": "Patch for MoxaNPort Cross-Site Request Forgery Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/84969" }, { "title": "Multiple Moxa Nport Repair measures for product cross-site request forgery vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66087" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11881" }, { "db": "JVNDB", "id": "JVNDB-2016-007641" }, { "db": "CNNVD", "id": "CNNVD-201612-034" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-98185" }, { "db": "JVNDB", "id": "JVNDB-2016-007641" }, { "db": "NVD", "id": "CVE-2016-9365" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/85965" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9365" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9365" }, { "trust": 0.3, "url": "http://www.moxa.com/product/vport_sdk.htm" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11881" }, { "db": "VULHUB", "id": "VHN-98185" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007641" }, { "db": "CNNVD", "id": "CNNVD-201612-034" }, { "db": "NVD", "id": "CVE-2016-9365" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11881" }, { "db": "VULHUB", "id": "VHN-98185" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007641" }, { "db": "CNNVD", "id": "CNNVD-201612-034" }, { "db": "NVD", "id": "CVE-2016-9365" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2016-11881" }, { "date": "2017-02-13T00:00:00", "db": "VULHUB", "id": "VHN-98185" }, { "date": "2016-04-08T00:00:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007641" }, { "date": "2016-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-034" }, { "date": "2017-02-13T21:59:02.207000", "db": "NVD", "id": "CVE-2016-9365" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-06T00:00:00", "db": "CNVD", "id": "CNVD-2016-11881" }, { "date": "2017-02-17T00:00:00", "db": "VULHUB", "id": "VHN-98185" }, { "date": "2016-12-20T02:04:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007641" }, { "date": "2016-12-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-034" }, { "date": "2024-11-21T03:01:01.710000", "db": "NVD", "id": "CVE-2016-9365" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-034" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa NPort Product cross-site request forgery vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007641" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-034" } ], "trust": 0.6 } }
var-201702-0596
Vulnerability from variot
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution. MOXANport is a serial communication server. MoxaNPort has an access control vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0596", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nport 5200 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5600 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5400 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5x50a1-m12 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.1" }, { "model": "nport 6100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5200a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5100a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5400 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5410", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600-8-dtl series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5630", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650i-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5x50a1-m12 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5150a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5110\u003c2.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5130/5150\u003c3.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5200\u003c2.8" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5400\u003c3.11" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5600\u003c3.7" }, { "model": "nport p5150a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5100a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5200a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5150ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5250ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5450ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600-8-dt", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport 5600-8-dtl", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "6x50\u003c1.13.11" }, { "model": "nport ia5450a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.4" }, { "model": "nport 6100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5600-8-dtl series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5400 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5200 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5x50a1-m12 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.1" }, { "model": "nport p5150a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport ia5450a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "6x500" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "64501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "62501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61100" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "60000" }, { "model": "nport 5x50ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-dt/dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-8-dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "56000" }, { "model": "nport 5450ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "54000" }, { "model": "nport 5250ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5200a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "52000" }, { "model": "nport 5150ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51503.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51303.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51102.5" }, { "model": "nport 5100a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51000" }, { "model": "nport ia5450a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "6x501.14" }, { "model": "nport 5600-8-dtl", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5600-8-dt", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "56003.7" }, { "model": "nport 5450ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "54003.11" }, { "model": "nport 5250ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "52002.8" }, { "model": "nport 5150ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51503.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51303.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51102.6" }, { "model": "nport 5100a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11884" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007644" }, { "db": "CNNVD", "id": "CNNVD-201612-031" }, { "db": "NVD", "id": "CVE-2016-9369" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:nport_5100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5100a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5400_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5410", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600-8-dtl_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5630", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650i-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5x50a1-m12_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_6100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_p5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_p5150a_series_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007644" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reid Wightman of Digital Bonds Labs", "sources": [ { "db": "BID", "id": "85965" }, { "db": "CNNVD", "id": "CNNVD-201612-031" } ], "trust": 0.9 }, "cve": "CVE-2016-9369", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2016-9369", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-11884", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-98189", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-9369", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-9369", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-9369", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2016-11884", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201612-031", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-98189", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11884" }, { "db": "VULHUB", "id": "VHN-98189" }, { "db": "JVNDB", "id": "JVNDB-2016-007644" }, { "db": "CNNVD", "id": "CNNVD-201612-031" }, { "db": "NVD", "id": "CVE-2016-9369" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution. MOXANport is a serial communication server. MoxaNPort has an access control vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system", "sources": [ { "db": "NVD", "id": "CVE-2016-9369" }, { "db": "JVNDB", "id": "JVNDB-2016-007644" }, { "db": "CNVD", "id": "CNVD-2016-11884" }, { "db": "BID", "id": "85965" }, { "db": "VULHUB", "id": "VHN-98189" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-9369", "trust": 3.4 }, { "db": "ICS CERT", "id": "ICSA-16-336-02", "trust": 3.4 }, { "db": "BID", "id": "85965", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2016-007644", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-031", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11884", "trust": 0.6 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-16-099-01", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-98189", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11884" }, { "db": "VULHUB", "id": "VHN-98189" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007644" }, { "db": "CNNVD", "id": "CNNVD-201612-031" }, { "db": "NVD", "id": "CVE-2016-9369" } ] }, "id": "VAR-201702-0596", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11884" }, { "db": "VULHUB", "id": "VHN-98189" } ], "trust": 1.592224151 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11884" } ] }, "last_update_date": "2024-11-23T21:54:16.859000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://japan.moxa.com/index.htm" }, { "title": "MoxaNPort Access Control Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/84973" }, { "title": "Multiple Moxa Nport Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66084" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11884" }, { "db": "JVNDB", "id": "JVNDB-2016-007644" }, { "db": "CNNVD", "id": "CNNVD-201612-031" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-98189" }, { "db": "JVNDB", "id": "JVNDB-2016-007644" }, { "db": "NVD", "id": "CVE-2016-9369" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/85965" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9369" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9369" }, { "trust": 0.3, "url": "http://www.moxa.com/product/vport_sdk.htm" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11884" }, { "db": "VULHUB", "id": "VHN-98189" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007644" }, { "db": "CNNVD", "id": "CNNVD-201612-031" }, { "db": "NVD", "id": "CVE-2016-9369" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11884" }, { "db": "VULHUB", "id": "VHN-98189" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007644" }, { "db": "CNNVD", "id": "CNNVD-201612-031" }, { "db": "NVD", "id": "CVE-2016-9369" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2016-11884" }, { "date": "2017-02-13T00:00:00", "db": "VULHUB", "id": "VHN-98189" }, { "date": "2016-04-08T00:00:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007644" }, { "date": "2016-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-031" }, { "date": "2017-02-13T21:59:02.300000", "db": "NVD", "id": "CVE-2016-9369" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-06T00:00:00", "db": "CNVD", "id": "CNVD-2016-11884" }, { "date": "2017-02-17T00:00:00", "db": "VULHUB", "id": "VHN-98189" }, { "date": "2016-12-20T02:04:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007644" }, { "date": "2016-12-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-031" }, { "date": "2024-11-21T03:01:02.243000", "db": "NVD", "id": "CVE-2016-9369" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-031" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa NPort Remote code execution vulnerability in product firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007644" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-031" } ], "trust": 0.6 } }
var-201702-0594
Vulnerability from variot
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication. MOXANport is a serial communication server. MoxaNPort has an authentication vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0594", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nport 5200 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5600 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5400 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5x50a1-m12 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.1" }, { "model": "nport 6100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5200a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5100a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5400 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5410", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600-8-dtl series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5630", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650i-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5x50a1-m12 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5150a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5110\u003c2.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5130/5150\u003c3.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5200\u003c2.8" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5400\u003c3.11" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5600\u003c3.7" }, { "model": "nport p5150a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5100a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5200a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5150ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5250ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5450ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600-8-dt", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport 5600-8-dtl", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "6x50\u003c1.13.11" }, { "model": "nport ia5450a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.4" }, { "model": "nport 6100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5400 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5200 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5x50a1-m12 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.1" }, { "model": "nport p5150a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport ia5450a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "6x500" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "64501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "62501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61100" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "60000" }, { "model": "nport 5x50ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-dt/dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-8-dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "56000" }, { "model": "nport 5450ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "54000" }, { "model": "nport 5250ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5200a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "52000" }, { "model": "nport 5150ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51503.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51303.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51102.5" }, { "model": "nport 5100a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51000" }, { "model": "nport ia5450a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "6x501.14" }, { "model": "nport 5600-8-dtl", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5600-8-dt", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "56003.7" }, { "model": "nport 5450ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "54003.11" }, { "model": "nport 5250ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "52002.8" }, { "model": "nport 5150ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51503.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51303.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51102.6" }, { "model": "nport 5100a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11880" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007642" }, { "db": "CNNVD", "id": "CNNVD-201612-035" }, { "db": "NVD", "id": "CVE-2016-9366" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:nport_5100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5100a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5400_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5410", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600-8-dtl_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5630", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650i-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5x50a1-m12_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_6100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_p5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_p5150a_series_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007642" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reid Wightman of Digital Bonds Labs", "sources": [ { "db": "BID", "id": "85965" }, { "db": "CNNVD", "id": "CNNVD-201612-035" } ], "trust": 0.9 }, "cve": "CVE-2016-9366", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-9366", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-11880", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-98186", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-9366", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-9366", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-9366", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2016-11880", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201612-035", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-98186", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11880" }, { "db": "VULHUB", "id": "VHN-98186" }, { "db": "JVNDB", "id": "JVNDB-2016-007642" }, { "db": "CNNVD", "id": "CNNVD-201612-035" }, { "db": "NVD", "id": "CVE-2016-9366" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication. MOXANport is a serial communication server. MoxaNPort has an authentication vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system", "sources": [ { "db": "NVD", "id": "CVE-2016-9366" }, { "db": "JVNDB", "id": "JVNDB-2016-007642" }, { "db": "CNVD", "id": "CNVD-2016-11880" }, { "db": "BID", "id": "85965" }, { "db": "VULHUB", "id": "VHN-98186" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSA-16-336-02", "trust": 3.4 }, { "db": "NVD", "id": "CVE-2016-9366", "trust": 3.4 }, { "db": "BID", "id": "85965", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2016-007642", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-035", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11880", "trust": 0.6 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-16-099-01", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-98186", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11880" }, { "db": "VULHUB", "id": "VHN-98186" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007642" }, { "db": "CNNVD", "id": "CNNVD-201612-035" }, { "db": "NVD", "id": "CVE-2016-9366" } ] }, "id": "VAR-201702-0594", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11880" }, { "db": "VULHUB", "id": "VHN-98186" } ], "trust": 1.592224151 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11880" } ] }, "last_update_date": "2024-11-23T21:54:16.783000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://japan.moxa.com/index.htm" }, { "title": "MoxaNPort authentication vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/84968" }, { "title": "Multiple Moxa Nport Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66089" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11880" }, { "db": "JVNDB", "id": "JVNDB-2016-007642" }, { "db": "CNNVD", "id": "CNNVD-201612-035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-98186" }, { "db": "JVNDB", "id": "JVNDB-2016-007642" }, { "db": "NVD", "id": "CVE-2016-9366" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/85965" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9366" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9366" }, { "trust": 0.3, "url": "http://www.moxa.com/product/vport_sdk.htm" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11880" }, { "db": "VULHUB", "id": "VHN-98186" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007642" }, { "db": "CNNVD", "id": "CNNVD-201612-035" }, { "db": "NVD", "id": "CVE-2016-9366" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11880" }, { "db": "VULHUB", "id": "VHN-98186" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007642" }, { "db": "CNNVD", "id": "CNNVD-201612-035" }, { "db": "NVD", "id": "CVE-2016-9366" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2016-11880" }, { "date": "2017-02-13T00:00:00", "db": "VULHUB", "id": "VHN-98186" }, { "date": "2016-04-08T00:00:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007642" }, { "date": "2016-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-035" }, { "date": "2017-02-13T21:59:02.253000", "db": "NVD", "id": "CVE-2016-9366" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-06T00:00:00", "db": "CNVD", "id": "CNVD-2016-11880" }, { "date": "2017-02-17T00:00:00", "db": "VULHUB", "id": "VHN-98186" }, { "date": "2016-12-20T02:04:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007642" }, { "date": "2016-12-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-035" }, { "date": "2024-11-21T03:01:01.843000", "db": "NVD", "id": "CVE-2016-9366" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa NPort Vulnerabilities that can bypass product authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007642" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-035" } ], "trust": 0.6 } }
var-201702-0597
Vulnerability from variot
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING). plural Moxa NPort The product contains a cross-site scripting vulnerability.A cross-site scripting attack may be performed. MOXANport is a serial communication server. An attacker exploits a vulnerability to initiate a cross-site attack. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0597", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nport 5200 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5600 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5400 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5x50a1-m12 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.1" }, { "model": "nport 6100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5200a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5100a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5400 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5410", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600-8-dtl series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5630", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650i-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5x50a1-m12 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5150a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5110\u003c2.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5130/5150\u003c3.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5200\u003c2.8" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5400\u003c3.11" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5600\u003c3.7" }, { "model": "nport p5150a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5100a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5200a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5150ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5250ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5450ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600-8-dt", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport 5600-8-dtl", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "6x50\u003c1.13.11" }, { "model": "nport ia5450a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.4" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.5" }, { "model": "nport 6100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5600-8-dtl series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5400 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5x50a1-m12 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.1" }, { "model": "nport p5150a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport ia5450a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "6x500" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "64501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "62501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61100" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "60000" }, { "model": "nport 5x50ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-dt/dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-8-dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "56000" }, { "model": "nport 5450ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "54000" }, { "model": "nport 5250ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5200a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "52000" }, { "model": "nport 5150ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51503.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51303.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51102.5" }, { "model": "nport 5100a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51000" }, { "model": "nport ia5450a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "6x501.14" }, { "model": "nport 5600-8-dtl", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5600-8-dt", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "56003.7" }, { "model": "nport 5450ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "54003.11" }, { "model": "nport 5250ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "52002.8" }, { "model": "nport 5150ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51503.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51303.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51102.6" }, { "model": "nport 5100a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11882" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007645" }, { "db": "CNNVD", "id": "CNNVD-201612-033" }, { "db": "NVD", "id": "CVE-2016-9371" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:nport_5100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5100a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5400_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5410", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600-8-dtl_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5630", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650i-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5x50a1-m12_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_6100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_p5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_p5150a_series_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007645" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reid Wightman of Digital Bonds Labs", "sources": [ { "db": "BID", "id": "85965" }, { "db": "CNNVD", "id": "CNNVD-201612-033" } ], "trust": 0.9 }, "cve": "CVE-2016-9371", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2016-9371", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-11882", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-98191", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2016-9371", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-9371", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2016-9371", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2016-11882", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201612-033", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-98191", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11882" }, { "db": "VULHUB", "id": "VHN-98191" }, { "db": "JVNDB", "id": "JVNDB-2016-007645" }, { "db": "CNNVD", "id": "CNNVD-201612-033" }, { "db": "NVD", "id": "CVE-2016-9371" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING). plural Moxa NPort The product contains a cross-site scripting vulnerability.A cross-site scripting attack may be performed. MOXANport is a serial communication server. An attacker exploits a vulnerability to initiate a cross-site attack. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML", "sources": [ { "db": "NVD", "id": "CVE-2016-9371" }, { "db": "JVNDB", "id": "JVNDB-2016-007645" }, { "db": "CNVD", "id": "CNVD-2016-11882" }, { "db": "BID", "id": "85965" }, { "db": "VULHUB", "id": "VHN-98191" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-9371", "trust": 3.4 }, { "db": "ICS CERT", "id": "ICSA-16-336-02", "trust": 3.4 }, { "db": "BID", "id": "85965", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2016-007645", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-033", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11882", "trust": 0.6 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-16-099-01", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-98191", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11882" }, { "db": "VULHUB", "id": "VHN-98191" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007645" }, { "db": "CNNVD", "id": "CNNVD-201612-033" }, { "db": "NVD", "id": "CVE-2016-9371" } ] }, "id": "VAR-201702-0597", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11882" }, { "db": "VULHUB", "id": "VHN-98191" } ], "trust": 1.592224151 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11882" } ] }, "last_update_date": "2024-11-23T21:54:16.937000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://japan.moxa.com/index.htm" }, { "title": "MoxaNPort Cross-Site Scripting Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/84970" }, { "title": "Multiple Moxa Nport Fixes for product cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66086" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11882" }, { "db": "JVNDB", "id": "JVNDB-2016-007645" }, { "db": "CNNVD", "id": "CNNVD-201612-033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-98191" }, { "db": "JVNDB", "id": "JVNDB-2016-007645" }, { "db": "NVD", "id": "CVE-2016-9371" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/85965" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9371" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9371" }, { "trust": 0.3, "url": "http://www.moxa.com/product/vport_sdk.htm" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11882" }, { "db": "VULHUB", "id": "VHN-98191" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007645" }, { "db": "CNNVD", "id": "CNNVD-201612-033" }, { "db": "NVD", "id": "CVE-2016-9371" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11882" }, { "db": "VULHUB", "id": "VHN-98191" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007645" }, { "db": "CNNVD", "id": "CNNVD-201612-033" }, { "db": "NVD", "id": "CVE-2016-9371" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2016-11882" }, { "date": "2017-02-13T00:00:00", "db": "VULHUB", "id": "VHN-98191" }, { "date": "2016-04-08T00:00:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007645" }, { "date": "2016-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-033" }, { "date": "2017-02-13T21:59:02.347000", "db": "NVD", "id": "CVE-2016-9371" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-06T00:00:00", "db": "CNVD", "id": "CNVD-2016-11882" }, { "date": "2017-02-17T00:00:00", "db": "VULHUB", "id": "VHN-98191" }, { "date": "2016-12-20T02:04:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007645" }, { "date": "2016-12-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-033" }, { "date": "2024-11-21T03:01:02.400000", "db": "NVD", "id": "CVE-2016-9371" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa NPort Product cross-site scripting vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007645" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-033" } ], "trust": 0.6 } }
var-201702-0862
Vulnerability from variot
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Buffer overflow vulnerability may allow an unauthenticated attacker to remotely execute arbitrary code. MOXANport is a serial communication server. MoxaNPort has a buffer overflow vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0862", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nport 5200 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5600 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5400 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5x50a1-m12 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.1" }, { "model": "nport 6100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5200a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5100a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5400 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5410", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600-8-dtl series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5630", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650i-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5x50a1-m12 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5150a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5110\u003c2.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5130/5150\u003c3.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5200\u003c2.8" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5400\u003c3.11" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5600\u003c3.7" }, { "model": "nport p5150a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5100a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5200a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5150ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5250ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5450ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600-8-dt", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport 5600-8-dtl", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "6x50\u003c1.13.11" }, { "model": "nport ia5450a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.4" }, { "model": "nport 6100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5400 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5200 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5x50a1-m12 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.1" }, { "model": "nport p5150a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport ia5450a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "6x500" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "64501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "62501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61100" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "60000" }, { "model": "nport 5x50ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-dt/dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-8-dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "56000" }, { "model": "nport 5450ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "54000" }, { "model": "nport 5250ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5200a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "52000" }, { "model": "nport 5150ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51503.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51303.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51102.5" }, { "model": "nport 5100a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51000" }, { "model": "nport ia5450a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "6x501.14" }, { "model": "nport 5600-8-dtl", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5600-8-dt", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "56003.7" }, { "model": "nport 5450ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "54003.11" }, { "model": "nport 5250ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "52002.8" }, { "model": "nport 5150ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51503.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51303.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51102.6" }, { "model": "nport 5100a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11883" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007640" }, { "db": "CNNVD", "id": "CNNVD-201612-032" }, { "db": "NVD", "id": "CVE-2016-9363" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:nport_5100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5100a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5400_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5410", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600-8-dtl_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5630", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650i-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5x50a1-m12_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_6100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_p5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_p5150a_series_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007640" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reid Wightman of Digital Bonds Labs", "sources": [ { "db": "BID", "id": "85965" }, { "db": "CNNVD", "id": "CNNVD-201612-032" } ], "trust": 0.9 }, "cve": "CVE-2016-9363", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-9363", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-11883", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-98183", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2016-9363", "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-9363", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-9363", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-11883", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201612-032", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-98183", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11883" }, { "db": "VULHUB", "id": "VHN-98183" }, { "db": "JVNDB", "id": "JVNDB-2016-007640" }, { "db": "CNNVD", "id": "CNNVD-201612-032" }, { "db": "NVD", "id": "CVE-2016-9363" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Buffer overflow vulnerability may allow an unauthenticated attacker to remotely execute arbitrary code. MOXANport is a serial communication server. MoxaNPort has a buffer overflow vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system", "sources": [ { "db": "NVD", "id": "CVE-2016-9363" }, { "db": "JVNDB", "id": "JVNDB-2016-007640" }, { "db": "CNVD", "id": "CNVD-2016-11883" }, { "db": "BID", "id": "85965" }, { "db": "VULHUB", "id": "VHN-98183" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-9363", "trust": 3.4 }, { "db": "ICS CERT", "id": "ICSA-16-336-02", "trust": 3.4 }, { "db": "BID", "id": "85965", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2016-007640", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-032", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11883", "trust": 0.6 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-16-099-01", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-98183", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11883" }, { "db": "VULHUB", "id": "VHN-98183" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007640" }, { "db": "CNNVD", "id": "CNNVD-201612-032" }, { "db": "NVD", "id": "CVE-2016-9363" } ] }, "id": "VAR-201702-0862", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11883" }, { "db": "VULHUB", "id": "VHN-98183" } ], "trust": 1.592224151 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11883" } ] }, "last_update_date": "2024-11-23T21:54:16.973000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://japan.moxa.com/index.htm" }, { "title": "MoxaNPort Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/84971" }, { "title": "Multiple Moxa Nport Product Buffer Overflow Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66085" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11883" }, { "db": "JVNDB", "id": "JVNDB-2016-007640" }, { "db": "CNNVD", "id": "CNNVD-201612-032" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-98183" }, { "db": "JVNDB", "id": "JVNDB-2016-007640" }, { "db": "NVD", "id": "CVE-2016-9363" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/85965" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9363" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9363" }, { "trust": 0.3, "url": "http://www.moxa.com/product/vport_sdk.htm" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11883" }, { "db": "VULHUB", "id": "VHN-98183" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007640" }, { "db": "CNNVD", "id": "CNNVD-201612-032" }, { "db": "NVD", "id": "CVE-2016-9363" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11883" }, { "db": "VULHUB", "id": "VHN-98183" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007640" }, { "db": "CNNVD", "id": "CNNVD-201612-032" }, { "db": "NVD", "id": "CVE-2016-9363" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2016-11883" }, { "date": "2017-02-13T00:00:00", "db": "VULHUB", "id": "VHN-98183" }, { "date": "2016-04-08T00:00:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007640" }, { "date": "2016-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-032" }, { "date": "2017-02-13T21:59:02.143000", "db": "NVD", "id": "CVE-2016-9363" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-06T00:00:00", "db": "CNVD", "id": "CNVD-2016-11883" }, { "date": "2017-02-17T00:00:00", "db": "VULHUB", "id": "VHN-98183" }, { "date": "2016-12-20T02:04:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007640" }, { "date": "2016-12-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-032" }, { "date": "2024-11-21T03:01:01.443000", "db": "NVD", "id": "CVE-2016-9363" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-032" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa NPort Product buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007640" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-032" } ], "trust": 0.6 } }
var-201702-0595
Vulnerability from variot
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. The amount of resources requested by a malicious actor is not restricted, leading to a denial-of-service caused by resource exhaustion. plural Moxa NPort The product does not limit the amount of resources requested, resulting in denial of service (DoS) There is a vulnerability that can be exploited.Denial of service due to resource exhaustion by an attacker (DoS) May be in a state. MOXANport is a serial communication server. MoxaNPort has a denial of service vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0595", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nport 5200 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5600 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5400 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5x50a1-m12 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.1" }, { "model": "nport 6100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5200a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5100a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5400 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5410", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600-8-dtl series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5630", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650i-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5x50a1-m12 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5150a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5110\u003c2.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5130/5150\u003c3.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5200\u003c2.8" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5400\u003c3.11" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5600\u003c3.7" }, { "model": "nport p5150a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5100a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5200a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5150ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5250ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5450ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600-8-dt", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport 5600-8-dtl", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "6x50\u003c1.13.11" }, { "model": "nport ia5450a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.4" }, { "model": "nport 6100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5400 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5200 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5x50a1-m12 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.1" }, { "model": "nport p5150a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport ia5450a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "6x500" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "64501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "62501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61100" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "60000" }, { "model": "nport 5x50ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-dt/dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-8-dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "56000" }, { "model": "nport 5450ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "54000" }, { "model": "nport 5250ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5200a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "52000" }, { "model": "nport 5150ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51503.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51303.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51102.5" }, { "model": "nport 5100a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51000" }, { "model": "nport ia5450a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "6x501.14" }, { "model": "nport 5600-8-dtl", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5600-8-dt", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "56003.7" }, { "model": "nport 5450ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "54003.11" }, { "model": "nport 5250ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "52002.8" }, { "model": "nport 5150ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51503.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51303.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51102.6" }, { "model": "nport 5100a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11878" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007643" }, { "db": "CNNVD", "id": "CNNVD-201612-037" }, { "db": "NVD", "id": "CVE-2016-9367" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:nport_5100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5100a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5400_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5410", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600-8-dtl_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5630", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650i-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5x50a1-m12_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_6100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_p5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_p5150a_series_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007643" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reid Wightman of Digital Bonds Labs", "sources": [ { "db": "BID", "id": "85965" }, { "db": "CNNVD", "id": "CNNVD-201612-037" } ], "trust": 0.9 }, "cve": "CVE-2016-9367", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2016-9367", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-11878", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-98187", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2016-9367", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-9367", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-9367", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-11878", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201612-037", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-98187", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11878" }, { "db": "VULHUB", "id": "VHN-98187" }, { "db": "JVNDB", "id": "JVNDB-2016-007643" }, { "db": "CNNVD", "id": "CNNVD-201612-037" }, { "db": "NVD", "id": "CVE-2016-9367" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. The amount of resources requested by a malicious actor is not restricted, leading to a denial-of-service caused by resource exhaustion. plural Moxa NPort The product does not limit the amount of resources requested, resulting in denial of service (DoS) There is a vulnerability that can be exploited.Denial of service due to resource exhaustion by an attacker (DoS) May be in a state. MOXANport is a serial communication server. MoxaNPort has a denial of service vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system", "sources": [ { "db": "NVD", "id": "CVE-2016-9367" }, { "db": "JVNDB", "id": "JVNDB-2016-007643" }, { "db": "CNVD", "id": "CNVD-2016-11878" }, { "db": "BID", "id": "85965" }, { "db": "VULHUB", "id": "VHN-98187" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-9367", "trust": 3.4 }, { "db": "ICS CERT", "id": "ICSA-16-336-02", "trust": 3.4 }, { "db": "BID", "id": "85965", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2016-007643", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-037", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11878", "trust": 0.6 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-16-099-01", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-98187", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11878" }, { "db": "VULHUB", "id": "VHN-98187" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007643" }, { "db": "CNNVD", "id": "CNNVD-201612-037" }, { "db": "NVD", "id": "CVE-2016-9367" } ] }, "id": "VAR-201702-0595", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11878" }, { "db": "VULHUB", "id": "VHN-98187" } ], "trust": 1.592224151 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11878" } ] }, "last_update_date": "2024-11-23T21:54:16.900000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://japan.moxa.com/index.htm" }, { "title": "MoxaNPort denial of service vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/84965" }, { "title": "Multiple Moxa Nport Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66091" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11878" }, { "db": "JVNDB", "id": "JVNDB-2016-007643" }, { "db": "CNNVD", "id": "CNNVD-201612-037" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-98187" }, { "db": "JVNDB", "id": "JVNDB-2016-007643" }, { "db": "NVD", "id": "CVE-2016-9367" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/85965" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9367" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9367" }, { "trust": 0.3, "url": "http://www.moxa.com/product/vport_sdk.htm" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11878" }, { "db": "VULHUB", "id": "VHN-98187" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007643" }, { "db": "CNNVD", "id": "CNNVD-201612-037" }, { "db": "NVD", "id": "CVE-2016-9367" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11878" }, { "db": "VULHUB", "id": "VHN-98187" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007643" }, { "db": "CNNVD", "id": "CNNVD-201612-037" }, { "db": "NVD", "id": "CVE-2016-9367" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2016-11878" }, { "date": "2017-02-13T00:00:00", "db": "VULHUB", "id": "VHN-98187" }, { "date": "2016-04-08T00:00:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007643" }, { "date": "2016-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-037" }, { "date": "2017-02-13T21:59:02.267000", "db": "NVD", "id": "CVE-2016-9367" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-06T00:00:00", "db": "CNVD", "id": "CNVD-2016-11878" }, { "date": "2017-02-17T00:00:00", "db": "VULHUB", "id": "VHN-98187" }, { "date": "2016-12-20T02:04:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007643" }, { "date": "2016-12-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-037" }, { "date": "2024-11-21T03:01:01.983000", "db": "NVD", "id": "CVE-2016-9367" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-037" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa NPort Denial of service in products (DoS) Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007643" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-037" } ], "trust": 0.6 } }
var-201702-0860
Vulnerability from variot
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating. MOXANport is a serial communication server. MoxaNPort has a credential management vulnerability. An unauthenticated attacker exploits the vulnerability to obtain an administrator password. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. ##
This module requires Metasploit: https://metasploit.com/download
Current source: https://github.com/rapid7/metasploit-framework
class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Auxiliary::UDPScanner
def initialize(info = {}) super( update_info( info, 'Name' => 'Moxa UDP Device Discovery', 'Description' => %q( The Moxa protocol listens on 4800/UDP and will respond to broadcast or direct traffic. The service is known to be used on Moxa devices in the NPort, OnCell, and MGate product lines.
A discovery packet compels a Moxa device to respond to the sender
with some basic device information that is needed for more advanced
functions. The discovery data is 8 bytes in length and is the most
basic example of the Moxa protocol. It may be sent out as a
broadcast (destination 255.255.255.255) or to an individual device.
Devices that respond to this query may be vulnerable to serious
information disclosure vulnerabilities, such as CVE-2016-9361.
The module is the work of Patrick DeSantis of Cisco Talos and is
derived from original work by K. Reid Wightman. Tested and validated
on a Moxa NPort 6250 with firmware versions 1.13 and 1.15.
),
'Author' => 'Patrick DeSantis <p[at]t-r10t.com>',
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2016-9361'],
[ 'URL', 'https://www.digitalbond.com/blog/2016/10/25/serial-killers/'],
[ 'URL', 'http://www.moxa.com/support/faq/faq_detail.aspx?id=646' ],
]
)
)
register_options(
[
# Moxa protocol listens on 4800/UDP by default
Opt::RPORT(4800)
])
end
# The data to be sent via UDP def build_probe # Function Code (first byte) 0x01: Moxa discovery/identify # The fourth byte is the length of the full data payload @probe ||= "\x01\x00\x00\x08\x00\x00\x00\x00" end
# Called for each response packet def scanner_process(response, src_host, _src_port) # The first byte of a response will always be the func code + 0x80 # (the most significant bit of the byte is set to 1, so 0b00000001 # becomes 0b10000001, or 0x81). # A valid response is 24 bytes, starts with 0x81, and contains the values # 0x00, 0x90, 0xe8 (the Moxa OIU) in bytes 14, 15, and 16. return unless response[0] == "\x81" && response[14..16] == "\x00\x90\xe8" && response.length == 24 @results[src_host] ||= [] @results[src_host] << response end
# Called after the scan block def scanner_postscan(_batch) @results.each_pair do |host, response| peer = "#{host}:#{rport}"
# Report the host
report_host(
:host => host,
:info => "Moxa Device",
)
# Report the service
report_service(
host: host,
proto: 'udp',
port: rport,
name: 'Moxa Protocol',
)
if response.empty?
vprint_status("#{peer} No Moxa Devices Found.")
else
print_good("#{peer} Moxa Device Found!")
# Report vuln
report_vuln(
host: host,
port: rport,
proto: 'udp',
name: 'Moxa Protocol Use',
refs: references
)
end
end
end end
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0860", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nport 5200 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5600 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5400 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5x50a1-m12 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.1" }, { "model": "nport 6100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5200a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5100a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5400 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5410", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600-8-dtl series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5630", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650i-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5x50a1-m12 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5150a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5110\u003c2.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5130/5150\u003c3.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5200\u003c2.8" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5400\u003c3.11" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5600\u003c3.7" }, { "model": "nport p5150a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5100a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5200a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5150ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5250ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5450ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600-8-dt", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport 5600-8-dtl", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "6x50\u003c1.13.11" }, { "model": "nport ia5450a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.4" }, { "model": "nport 6100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5400 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5x50a1-m12 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.1" }, { "model": "nport p5150a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport ia5450a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "6x500" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "64501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "62501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61100" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "60000" }, { "model": "nport 5x50ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-dt/dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-8-dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "56000" }, { "model": "nport 5450ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "54000" }, { "model": "nport 5250ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5200a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "52000" }, { "model": "nport 5150ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51503.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51303.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51102.5" }, { "model": "nport 5100a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51000" }, { "model": "nport ia5450a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "6x501.14" }, { "model": "nport 5600-8-dtl", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5600-8-dt", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "56003.7" }, { "model": "nport 5450ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "54003.11" }, { "model": "nport 5250ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "52002.8" }, { "model": "nport 5150ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51503.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51303.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51102.6" }, { "model": "nport 5100a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:nport_5100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5100a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5400_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5410", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600-8-dtl_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5630", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650i-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5x50a1-m12_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_6100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_p5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_p5150a_series_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007639" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reid Wightman of Digital Bonds Labs", "sources": [ { "db": "BID", "id": "85965" }, { "db": "CNNVD", "id": "CNNVD-201612-030" } ], "trust": 0.9 }, "cve": "CVE-2016-9361", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-9361", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-11885", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-98181", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-9361", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-9361", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-9361", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2016-11885", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201612-030", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-98181", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-9361", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating. MOXANport is a serial communication server. MoxaNPort has a credential management vulnerability. An unauthenticated attacker exploits the vulnerability to obtain an administrator password. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. ##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule \u003c Msf::Auxiliary\n include Msf::Auxiliary::Report\n include Msf::Auxiliary::UDPScanner\n\n def initialize(info = {})\n super(\n update_info(\n info,\n \u0027Name\u0027 =\u003e \u0027Moxa UDP Device Discovery\u0027,\n \u0027Description\u0027 =\u003e %q(\n The Moxa protocol listens on 4800/UDP and will respond to broadcast\n or direct traffic. The service is known to be used on Moxa devices\n in the NPort, OnCell, and MGate product lines. \n\n A discovery packet compels a Moxa device to respond to the sender\n with some basic device information that is needed for more advanced\n functions. The discovery data is 8 bytes in length and is the most\n basic example of the Moxa protocol. It may be sent out as a\n broadcast (destination 255.255.255.255) or to an individual device. \n\n Devices that respond to this query may be vulnerable to serious\n information disclosure vulnerabilities, such as CVE-2016-9361. \n\n The module is the work of Patrick DeSantis of Cisco Talos and is\n derived from original work by K. Reid Wightman. Tested and validated\n on a Moxa NPort 6250 with firmware versions 1.13 and 1.15. \n ),\n \u0027Author\u0027 =\u003e \u0027Patrick DeSantis \u003cp[at]t-r10t.com\u003e\u0027,\n \u0027License\u0027 =\u003e MSF_LICENSE,\n \u0027References\u0027 =\u003e\n [\n [ \u0027CVE\u0027, \u00272016-9361\u0027],\n [ \u0027URL\u0027, \u0027https://www.digitalbond.com/blog/2016/10/25/serial-killers/\u0027],\n [ \u0027URL\u0027, \u0027http://www.moxa.com/support/faq/faq_detail.aspx?id=646\u0027 ],\n ]\n )\n )\n\n register_options(\n [\n # Moxa protocol listens on 4800/UDP by default\n Opt::RPORT(4800)\n ])\n end\n\n # The data to be sent via UDP\n def build_probe\n # Function Code (first byte) 0x01: Moxa discovery/identify\n # The fourth byte is the length of the full data payload\n @probe ||= \"\\x01\\x00\\x00\\x08\\x00\\x00\\x00\\x00\"\n end\n\n # Called for each response packet\n def scanner_process(response, src_host, _src_port)\n # The first byte of a response will always be the func code + 0x80\n # (the most significant bit of the byte is set to 1, so 0b00000001\n # becomes 0b10000001, or 0x81). \n # A valid response is 24 bytes, starts with 0x81, and contains the values\n # 0x00, 0x90, 0xe8 (the Moxa OIU) in bytes 14, 15, and 16. \n return unless response[0] == \"\\x81\" \u0026\u0026 response[14..16] == \"\\x00\\x90\\xe8\" \u0026\u0026 response.length == 24\n @results[src_host] ||= []\n @results[src_host] \u003c\u003c response\n end\n\n # Called after the scan block\n def scanner_postscan(_batch)\n @results.each_pair do |host, response|\n peer = \"#{host}:#{rport}\"\n\n # Report the host\n report_host(\n :host =\u003e host,\n :info =\u003e \"Moxa Device\",\n )\n\n # Report the service\n report_service(\n host: host,\n proto: \u0027udp\u0027,\n port: rport,\n name: \u0027Moxa Protocol\u0027,\n )\n\n if response.empty?\n vprint_status(\"#{peer} No Moxa Devices Found.\")\n else\n print_good(\"#{peer} Moxa Device Found!\")\n\n # Report vuln\n report_vuln(\n host: host,\n port: rport,\n proto: \u0027udp\u0027,\n name: \u0027Moxa Protocol Use\u0027,\n refs: references\n )\n end\n end\n end\nend\n", "sources": [ { "db": "NVD", "id": "CVE-2016-9361" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "BID", "id": "85965" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "PACKETSTORM", "id": "180949" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-9361", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-16-336-02", "trust": 3.5 }, { "db": "BID", "id": "85965", "trust": 2.1 }, { "db": "JVNDB", "id": "JVNDB-2016-007639", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-030", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11885", "trust": 0.6 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-16-099-01", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-98181", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-9361", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "180949", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "PACKETSTORM", "id": "180949" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "id": "VAR-201702-0860", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" } ], "trust": 1.592224151 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" } ] }, "last_update_date": "2024-11-23T21:54:17.013000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://japan.moxa.com/index.htm" }, { "title": "MoxaNPort Credential Management Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/84974" }, { "title": "Multiple Moxa Nport Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66082" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "CNNVD", "id": "CNNVD-201612-030" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-98181" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.5, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/85965" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9361" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9361" }, { "trust": 0.3, "url": "http://www.moxa.com/product/vport_sdk.htm" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/modules/auxiliary/scanner/scada/moxa_discover" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9361" }, { "trust": 0.1, "url": "https://github.com/rapid7/metasploit-framework" }, { "trust": 0.1, "url": "https://metasploit.com/download" }, { "trust": 0.1, "url": "https://www.digitalbond.com/blog/2016/10/25/serial-killers/\u0027]," }, { "trust": 0.1, "url": "http://www.moxa.com/support/faq/faq_detail.aspx?id=646\u0027" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "PACKETSTORM", "id": "180949" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "PACKETSTORM", "id": "180949" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2016-11885" }, { "date": "2017-02-13T00:00:00", "db": "VULHUB", "id": "VHN-98181" }, { "date": "2017-02-13T00:00:00", "db": "VULMON", "id": "CVE-2016-9361" }, { "date": "2016-04-08T00:00:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "date": "2024-08-31T23:16:47", "db": "PACKETSTORM", "id": "180949" }, { "date": "2016-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-030" }, { "date": "2017-02-13T21:59:02.080000", "db": "NVD", "id": "CVE-2016-9361" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-06T00:00:00", "db": "CNVD", "id": "CNVD-2016-11885" }, { "date": "2017-02-17T00:00:00", "db": "VULHUB", "id": "VHN-98181" }, { "date": "2017-02-17T00:00:00", "db": "VULMON", "id": "CVE-2016-9361" }, { "date": "2016-12-20T02:04:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "date": "2016-12-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-030" }, { "date": "2024-11-21T03:01:01.187000", "db": "NVD", "id": "CVE-2016-9361" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-030" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa NPort Vulnerability in product management passwords being retried without authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007639" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-030" } ], "trust": 0.6 } }
var-201702-0851
Vulnerability from variot
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. A configuration file contains parameters that represent passwords in plaintext. MOXANport is a serial communication server. MoxaNPort has a plaintext storage vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. An attacker could exploit this vulnerability to obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0851", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nport 5200 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5600 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5400 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5x50a1-m12 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.1" }, { "model": "nport 6100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5200a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5100a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5400 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5410", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600-8-dtl series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5630", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650i-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5x50a1-m12 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5150a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5110\u003c2.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5130/5150\u003c3.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5200\u003c2.8" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5400\u003c3.11" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5600\u003c3.7" }, { "model": "nport p5150a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5100a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5200a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5150ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5250ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5450ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600-8-dt", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport 5600-8-dtl", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "6x50\u003c1.13.11" }, { "model": "nport ia5450a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.4" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5400 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5200 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5x50a1-m12 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.1" }, { "model": "nport p5150a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport ia5450a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "6x500" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "64501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "62501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61100" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "60000" }, { "model": "nport 5x50ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-dt/dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-8-dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "56000" }, { "model": "nport 5450ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "54000" }, { "model": "nport 5250ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5200a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "52000" }, { "model": "nport 5150ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51503.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51303.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51102.5" }, { "model": "nport 5100a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51000" }, { "model": "nport ia5450a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "6x501.14" }, { "model": "nport 5600-8-dtl", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5600-8-dt", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "56003.7" }, { "model": "nport 5450ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "54003.11" }, { "model": "nport 5250ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "52002.8" }, { "model": "nport 5150ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51503.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51303.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51102.6" }, { "model": "nport 5100a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11879" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007638" }, { "db": "CNNVD", "id": "CNNVD-201612-036" }, { "db": "NVD", "id": "CVE-2016-9348" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:nport_5100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5100a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5400_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5410", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600-8-dtl_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5630", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650i-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5x50a1-m12_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_6100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_p5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_p5150a_series_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007638" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reid Wightman of Digital Bonds Labs", "sources": [ { "db": "BID", "id": "85965" }, { "db": "CNNVD", "id": "CNNVD-201612-036" } ], "trust": 0.9 }, "cve": "CVE-2016-9348", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2016-9348", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 1.7, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.1, "id": "CNVD-2016-11879", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-98168", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2016-9348", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-9348", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2016-9348", "trust": 0.8, "value": "Low" }, { "author": "CNVD", "id": "CNVD-2016-11879", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201612-036", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-98168", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11879" }, { "db": "VULHUB", "id": "VHN-98168" }, { "db": "JVNDB", "id": "JVNDB-2016-007638" }, { "db": "CNNVD", "id": "CNNVD-201612-036" }, { "db": "NVD", "id": "CVE-2016-9348" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. A configuration file contains parameters that represent passwords in plaintext. MOXANport is a serial communication server. MoxaNPort has a plaintext storage vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. An attacker could exploit this vulnerability to obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2016-9348" }, { "db": "JVNDB", "id": "JVNDB-2016-007638" }, { "db": "CNVD", "id": "CNVD-2016-11879" }, { "db": "BID", "id": "85965" }, { "db": "VULHUB", "id": "VHN-98168" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-9348", "trust": 3.4 }, { "db": "ICS CERT", "id": "ICSA-16-336-02", "trust": 3.4 }, { "db": "BID", "id": "85965", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2016-007638", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-036", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11879", "trust": 0.6 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-16-099-01", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-98168", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11879" }, { "db": "VULHUB", "id": "VHN-98168" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007638" }, { "db": "CNNVD", "id": "CNNVD-201612-036" }, { "db": "NVD", "id": "CVE-2016-9348" } ] }, "id": "VAR-201702-0851", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11879" }, { "db": "VULHUB", "id": "VHN-98168" } ], "trust": 1.592224151 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11879" } ] }, "last_update_date": "2024-11-23T21:54:16.745000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://japan.moxa.com/index.htm" }, { "title": "MoxaNPort plaintext storage vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/84966" }, { "title": "Multiple Moxa Nport Product configuration error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66090" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11879" }, { "db": "JVNDB", "id": "JVNDB-2016-007638" }, { "db": "CNNVD", "id": "CNNVD-201612-036" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-98168" }, { "db": "JVNDB", "id": "JVNDB-2016-007638" }, { "db": "NVD", "id": "CVE-2016-9348" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/85965" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9348" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9348" }, { "trust": 0.3, "url": "http://www.moxa.com/product/vport_sdk.htm" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11879" }, { "db": "VULHUB", "id": "VHN-98168" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007638" }, { "db": "CNNVD", "id": "CNNVD-201612-036" }, { "db": "NVD", "id": "CVE-2016-9348" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11879" }, { "db": "VULHUB", "id": "VHN-98168" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007638" }, { "db": "CNNVD", "id": "CNNVD-201612-036" }, { "db": "NVD", "id": "CVE-2016-9348" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2016-11879" }, { "date": "2017-02-13T00:00:00", "db": "VULHUB", "id": "VHN-98168" }, { "date": "2016-04-08T00:00:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007638" }, { "date": "2016-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-036" }, { "date": "2017-02-13T21:59:01.847000", "db": "NVD", "id": "CVE-2016-9348" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-06T00:00:00", "db": "CNVD", "id": "CNVD-2016-11879" }, { "date": "2017-02-17T00:00:00", "db": "VULHUB", "id": "VHN-98168" }, { "date": "2016-12-20T02:04:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007638" }, { "date": "2016-12-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-036" }, { "date": "2024-11-21T03:00:59.943000", "db": "NVD", "id": "CVE-2016-9348" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-036" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa NPort Vulnerability in product passwords displayed in clear text", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007638" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-036" } ], "trust": 0.6 } }
CVE-2023-4929 (GCVE-0-2023-4929)
Vulnerability from cvelistv5
- CWE-354 - Improper Validation of Integrity Check Value
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Moxa | NPort 5000AI-M12 Series |
Version: 1.0 < |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:44:52.628Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:moxa:nport_5100ai_m12:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nport_5100ai_m12", "vendor": "moxa", "versions": [ { "lessThanOrEqual": "1.5", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moxa:nport_5100:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nport_5100", "vendor": "moxa", "versions": [ { "lessThanOrEqual": "3.10", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:moxa:nport_5100a:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nport_5100a", "vendor": "moxa", "versions": [ { "lessThanOrEqual": "1.6", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:moxa:nport_5200_series_firmware:2.7:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nport_5200_series_firmware", "vendor": "moxa", "versions": [ { "lessThanOrEqual": "2.12", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:moxa:nport_5200a_series_firmware:1.2:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nport_5200a_series_firmware", "vendor": "moxa", "versions": [ { "lessThanOrEqual": "2.12", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nport_5600_series_firmware", "vendor": "moxa", "versions": [ { "lessThanOrEqual": "3.11", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moxa:nport_5600_dt:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nport_5600_dt", "vendor": "moxa", "versions": [ { "lessThanOrEqual": "2.9", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moxa:nport_ia_5000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nport_ia_5000", "vendor": "moxa", "versions": [ { "lessThanOrEqual": "2.1", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moxa:nport_ia_5000a:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nport_ia_5000a", "vendor": "moxa", "versions": [ { "lessThanOrEqual": "2.0", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moxa:nport_ia_5000a_io:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nport_ia_5000a_io", "vendor": "moxa", "versions": [ { "lessThanOrEqual": "2.0", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moxa:nport_iaw_5000a_io:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nport_iaw_5000a_io", "vendor": "moxa", "versions": [ { "lessThanOrEqual": "2.2", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moxa:nport_p5150a:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nport_p5150a", "vendor": "moxa", "versions": [ { "lessThanOrEqual": "1.6", "status": "affected", "version": "1.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-4929", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T13:08:12.493856Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T13:29:04.471Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "NPort 5000AI-M12 Series", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "1.5", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "NPort 5100 Series", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "3.10", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "NPort 5100A Series ", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "1.6", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "NPort 5200 Series", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "2.12", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "NPort 5200A Series", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "1.6", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "NPort 5400 Series", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "3.14", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "NPort 5600 Series", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "3.11", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "NPort 5600-DT Series", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "2.9", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "NPort IA5000 Series", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "2.1", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "NPort IA5000A Series", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "2.0", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "NPort IA5000A-I/O Series", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "2.0", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "NPort IAW5000A-I/O Series", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "2.2", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "NPort P5150A Series", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "1.6", "status": "affected", "version": "1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAll firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices.\u003c/p\u003e" } ], "value": "All firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices.\n\n" } ], "impacts": [ { "capecId": "CAPEC-145", "descriptions": [ { "lang": "en", "value": "CAPEC-145 Checksum Spoofing" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-354", "description": "CWE-354 Improper Validation of Integrity Check Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-03T13:54:49.293Z", "orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa", "shortName": "Moxa" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eDue to design restrictions, we could not fix this vulnerability in NPort 5000 Series. We suggest users follow the instructions in the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.moxa.com/getmedia/67b5e549-a125-4a6a-b99b-23017c75cfc1/moxa-the-security-hardening-guide-for-the-nport-5000-series-tech-note-v1.1.pdf\"\u003e\u003cu\u003ehardening guide\u003c/u\u003e\u003c/a\u003e in order to mitigate this vulnerability. Additionally, refer to the following mitigation measures to deploy the product in an appropriate product security context. \u003c/p\u003e\u003cp\u003eMoxa recommends users follow these CISA recommendations. Users should \u003c/p\u003e\u003col\u003e\u003cli\u003eReduce network exposure by ensuring that all control system devices and systems are not accessible from the Internet.\u003c/li\u003e\u003cli\u003ePlace control system networks and remote devices behind firewalls, isolating them from business networks.\u003c/li\u003e\u003cli\u003eWhen remote access is necessary, employ secure methods such as Virtual Private Networks (VPNs). It is important to note that VPNs may have vulnerabilities and should be kept up to date with the latest available version. Remember that the security of a VPN depends on the security of its connected devices.\u003c/li\u003e\u003c/ol\u003e" } ], "value": "Due to design restrictions, we could not fix this vulnerability in NPort 5000 Series. We suggest users follow the instructions in the hardening guide https://www.moxa.com/getmedia/67b5e549-a125-4a6a-b99b-23017c75cfc1/moxa-the-security-hardening-guide-for-the-nport-5000-series-tech-note-v1.1.pdf in order to mitigate this vulnerability. Additionally, refer to the following mitigation measures to deploy the product in an appropriate product security context. \n\nMoxa recommends users follow these CISA recommendations. Users should \n\n * Reduce network exposure by ensuring that all control system devices and systems are not accessible from the Internet.\n * Place control system networks and remote devices behind firewalls, isolating them from business networks.\n * When remote access is necessary, employ secure methods such as Virtual Private Networks (VPNs). It is important to note that VPNs may have vulnerabilities and should be kept up to date with the latest available version. Remember that the security of a VPN depends on the security of its connected devices.\n" } ], "source": { "discovery": "EXTERNAL" }, "title": "NPort 5000 Series Firmware Improper Validation of Integrity Check Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa", "assignerShortName": "Moxa", "cveId": "CVE-2023-4929", "datePublished": "2023-10-03T13:54:49.293Z", "dateReserved": "2023-09-13T01:12:13.466Z", "dateUpdated": "2024-09-23T13:29:04.471Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }