Vulnerabilites related to moxa - edr-g902
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | edr-g902-t_firmware | * | |
moxa | edr-g902-t | - | |
moxa | edr-g902_firmware | * | |
moxa | edr-g902 | - | |
moxa | edr-g903-t_firmware | * | |
moxa | edr-g903-t | - | |
moxa | edr-g903_firmware | * | |
moxa | edr-g903 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g902-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "181D152B-88C8-46A6-B15A-61C42A8CBF82", "versionEndIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g902-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "917B2620-0DEE-4AE8-978B-237705CAEBCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g902_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04BE1A05-43ED-40EF-AD8C-6FD52CFA24D0", "versionEndIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g902:-:*:*:*:*:*:*:*", "matchCriteriaId": "66893485-6060-432C-8BA7-106CE863A674", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EC3B876-CAD2-46DE-A243-24E12C10F1B0", "versionEndIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B390870B-F5C9-4F31-B19F-A81843C68DBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85C9724D-AE5A-4598-AE3E-9287DC54C4EE", "versionEndIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4)." }, { "lang": "es", "value": "El funcionamiento malicioso de la cookie del navegador web dise\u00f1ada puede causar un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria en el servidor web del sistema en los Enrutadores de la Serie EDR-G902 y EDR-G903 (versiones anteriores a 5.4)" } ], "id": "CVE-2020-14511", "lastModified": "2024-11-21T05:03:25.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-15T13:15:10.193", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
moxa | edr-g903_firmware | * | |
moxa | edr-g903 | - | |
moxa | edr-g903-t_firmware | * | |
moxa | edr-g903-t | - | |
moxa | edr-g902_firmware | * | |
moxa | edr-g902 | - | |
moxa | edr-g902-t_firmware | * | |
moxa | edr-g902-t | - | |
moxa | edr-810-vpn-2gsfp_firmware | * | |
moxa | edr-810-vpn-2gsfp | - | |
moxa | edr-810-vpn-2gsfp-t_firmware | * | |
moxa | edr-810-vpn-2gsfp-t | - | |
moxa | edr-810-2gsfp_firmware | * | |
moxa | edr-810-2gsfp | - | |
moxa | edr-810-2gsfp-t_firmware | * | |
moxa | edr-810-2gsfp-t | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA54A9F6-8B3E-4B7F-A608-4353E6D113FA", "versionEndExcluding": "5.7.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05DBA51B-821C-4CBC-97FD-B825089A069B", "versionEndExcluding": "5.7.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B390870B-F5C9-4F31-B19F-A81843C68DBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g902_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3EB1319-6D64-4B13-9798-3013B5D2B021", "versionEndExcluding": "5.7.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g902:-:*:*:*:*:*:*:*", "matchCriteriaId": "66893485-6060-432C-8BA7-106CE863A674", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g902-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6371B449-C90B-4B80-8FE5-3BA3F2D4ADF8", "versionEndExcluding": "5.7.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g902-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "917B2620-0DEE-4AE8-978B-237705CAEBCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-vpn-2gsfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB88BE5F-5436-4EFF-A40C-012306851FD8", "versionEndExcluding": "5.12.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-vpn-2gsfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "846CF4C9-5218-42D5-B10D-BDBFAE7556BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-vpn-2gsfp-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8261100-ECC0-44E0-AF88-D0E2F6ACE0E4", "versionEndExcluding": "5.12.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-vpn-2gsfp-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "154A49C3-905F-412F-8CCE-E35BB67FD703", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-2gsfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57A1AA13-FBFC-490E-B458-061562733DF0", "versionEndExcluding": "5.12.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-2gsfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D800350-748B-40F1-8C28-1C4BDC2FA2CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-2gsfp-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88114-0897-4D63-A585-E9465DA94A10", "versionEndExcluding": "5.12.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-2gsfp-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4668C54-FC34-47CF-A28C-233727686CA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot. \n" }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en Series EDR-810, EDR-G902 y EDR-G903, lo que las hace vulnerables a la vulnerabilidad de denegaci\u00f3n de servicio. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente en el URI, lo que potencialmente permite que usuarios malintencionados activen el reinicio del dispositivo." } ], "id": "CVE-2023-4452", "lastModified": "2024-11-21T08:35:11.450", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "psirt@moxa.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-01T15:15:08.803", "references": [ { "source": "psirt@moxa.com", "tags": [ "Vendor Advisory" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-234880-edr-810-g902-g903-series-web-server-buffer-overflow-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-234880-edr-810-g902-g903-series-web-server-buffer-overflow-vulnerability" } ], "sourceIdentifier": "psirt@moxa.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "psirt@moxa.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
moxa | edr-g903_firmware | * | |
moxa | edr-g903 | - | |
moxa | edr-g903-t_firmware | * | |
moxa | edr-g903-t | - | |
moxa | edr-g902_firmware | * | |
moxa | edr-g902 | - | |
moxa | edr-g902-t_firmware | * | |
moxa | edr-g902-t | - | |
moxa | edr-810-2gsfp_firmware | * | |
moxa | edr-810-2gsfp | - | |
moxa | edr-810-2gsfp-t_firmware | * | |
moxa | edr-810-2gsfp-t | - | |
moxa | edr-810-vpn-2gsfp_firmware | * | |
moxa | edr-810-vpn-2gsfp | - | |
moxa | edr-810-vpn-2gsfp-t_firmware | * | |
moxa | edr-810-vpn-2gsfp-t | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4CEE043-8CC5-47C1-B01B-8E46611EE767", "versionEndIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE987D3F-6CE6-4EA7-862D-89975857832F", "versionEndIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B390870B-F5C9-4F31-B19F-A81843C68DBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g902_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6836BBFB-B8D3-4883-AB6B-F9BD2DC4C672", "versionEndIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g902:-:*:*:*:*:*:*:*", "matchCriteriaId": "66893485-6060-432C-8BA7-106CE863A674", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g902-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F71F037C-1A30-4E0B-969E-6913086F5510", "versionEndIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g902-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "917B2620-0DEE-4AE8-978B-237705CAEBCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-2gsfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EAAD9CE-26E8-4156-9DA7-820039952022", "versionEndIncluding": "5.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-2gsfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D800350-748B-40F1-8C28-1C4BDC2FA2CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-2gsfp-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4B6A686-3F39-448E-8902-805C215E52AA", "versionEndIncluding": "5.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-2gsfp-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4668C54-FC34-47CF-A28C-233727686CA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-vpn-2gsfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC6B27D8-F828-4A79-B2CD-5C15717CC0B2", "versionEndIncluding": "5.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-vpn-2gsfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "846CF4C9-5218-42D5-B10D-BDBFAE7556BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-vpn-2gsfp-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "055DF648-DA46-4F45-B87E-624F1F5CBDB4", "versionEndIncluding": "5.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-vpn-2gsfp-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "154A49C3-905F-412F-8CCE-E35BB67FD703", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution." }, { "lang": "es", "value": "Determinados productos de Moxa Inc est\u00e1n afectados por una restricci\u00f3n inapropiada de operaciones en EDR-G903 Series Versi\u00f3n de Firmware 5.5 o inferiores, EDR-G902 Series Versi\u00f3n de Firmware 5.5 o inferiores, y EDR-810 Series Versi\u00f3n de Firmware 5.6 o inferiores.\u0026#xa0;Unas peticiones dise\u00f1adas enviadas al dispositivo pueden permitir una ejecuci\u00f3n de c\u00f3digo arbitraria remota" } ], "id": "CVE-2020-28144", "lastModified": "2024-11-21T05:22:24.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-03T13:15:12.653", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2020-28144 (GCVE-0-2020-28144)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:33:57.712Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-03T12:48:41", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-28144", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability", "refsource": "MISC", "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-28144", "datePublished": "2021-02-03T12:48:41", "dateReserved": "2020-11-02T00:00:00", "dateUpdated": "2024-08-04T16:33:57.712Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-14511 (GCVE-0-2020-14511)
Vulnerability from cvelistv5
- CWE-121 - STACK-BASED BUFFER OVERFLOW
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | EDR-G902 and EDR-G903 Series Routers |
Version: Versions prior to 5.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:46:34.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EDR-G902 and EDR-G903 Series Routers", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions prior to 5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-15T12:27:24", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-14511", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EDR-G902 and EDR-G903 Series Routers", "version": { "version_data": [ { "version_value": "Versions prior to 5.4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-14511", "datePublished": "2020-07-15T12:27:24", "dateReserved": "2020-06-19T00:00:00", "dateUpdated": "2024-08-04T12:46:34.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-4452 (GCVE-0-2023-4452)
Vulnerability from cvelistv5
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Moxa | EDR-810 Series |
Version: 1.0 < |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:24:04.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-234880-edr-810-g902-g903-series-web-server-buffer-overflow-vulnerability" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4452", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-05T15:46:43.241172Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-06T18:51:24.564Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "EDR-810 Series ", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "5.12.28", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EDR G902 Series ", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "5.7.20", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EDR G903 Series ", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "5.7.20", "status": "affected", "version": "1.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Zhiyuan Chen" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot. \u003c/span\u003e\u003cbr\u003e" } ], "value": "A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot. \n" } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-01T14:24:05.658Z", "orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa", "shortName": "Moxa" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-234880-edr-810-g902-g903-series-web-server-buffer-overflow-vulnerability" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.\u003cbr\u003e\u003cul\u003e\u003cli\u003eEDR-810 Series: Please upgrade to firmware v5.12.29 or later\u003c/li\u003e\u003cli\u003eEDR-G902 Series: Please upgrade to firmware v5.7.21 or later\u003c/li\u003e\u003cli\u003eEDR-G903 Series: Please upgrade to firmware v5.7.21 or later\u003c/li\u003e\u003c/ul\u003e" } ], "value": "Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.\n * EDR-810 Series: Please upgrade to firmware v5.12.29 or later\n * EDR-G902 Series: Please upgrade to firmware v5.7.21 or later\n * EDR-G903 Series: Please upgrade to firmware v5.7.21 or later\n\n\n" } ], "source": { "discovery": "EXTERNAL" }, "title": "Web Server Buffer Overflow Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa", "assignerShortName": "Moxa", "cveId": "CVE-2023-4452", "datePublished": "2023-11-01T14:24:05.658Z", "dateReserved": "2023-08-21T03:25:47.608Z", "dateUpdated": "2024-09-06T18:51:24.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202311-0287
Vulnerability from variot
A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202311-0287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr-810-2gsfp-t", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.12.29" }, { "model": "edr-810-vpn-2gsfp-t", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.12.29" }, { "model": "edr-810-vpn-2gsfp", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.12.29" }, { "model": "edr-g902", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.7.21" }, { "model": "edr-g902-t", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.7.21" }, { "model": "edr-g903", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.7.21" }, { "model": "edr-810-2gsfp", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.12.29" }, { "model": "edr-g903-t", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.7.21" } ], "sources": [ { "db": "NVD", "id": "CVE-2023-4452" } ] }, "cve": "CVE-2023-4452", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2023-4452", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "psirt@moxa.com", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2023-4452", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2023-4452", "trust": 1.0, "value": "HIGH" }, { "author": "psirt@moxa.com", "id": "CVE-2023-4452", "trust": 1.0, "value": "MEDIUM" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2023-4452" }, { "db": "NVD", "id": "CVE-2023-4452" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot", "sources": [ { "db": "NVD", "id": "CVE-2023-4452" }, { "db": "VULMON", "id": "CVE-2023-4452" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-4452", "trust": 1.1 }, { "db": "VULMON", "id": "CVE-2023-4452", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-4452" }, { "db": "NVD", "id": "CVE-2023-4452" } ] }, "id": "VAR-202311-0287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.43948413 }, "last_update_date": "2024-08-14T15:36:41.987000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2023-4452" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-234880-edr-810-g902-g903-series-web-server-buffer-overflow-vulnerability" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-4452" }, { "db": "NVD", "id": "CVE-2023-4452" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2023-4452" }, { "db": "NVD", "id": "CVE-2023-4452" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-01T00:00:00", "db": "VULMON", "id": "CVE-2023-4452" }, { "date": "2023-11-01T15:15:08.803000", "db": "NVD", "id": "CVE-2023-4452" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-01T00:00:00", "db": "VULMON", "id": "CVE-2023-4452" }, { "date": "2023-11-09T16:46:36.617000", "db": "NVD", "id": "CVE-2023-4452" } ] } }
var-202102-0357
Vulnerability from variot
Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution. plural Moxa EDR The product contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0357", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr-810-vpn-2gsfp-t", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.6" }, { "model": "edr-g903", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.5" }, { "model": "edr-810-vpn-2gsfp", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.6" }, { "model": "edr-g903-t", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.5" }, { "model": "edr-g902-t", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.5" }, { "model": "edr-g902", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.5" }, { "model": "edr-810-2gsfp", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.6" }, { "model": "edr-810-2gsfp-t", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.6" }, { "model": "edr-810 \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "edr-g902 \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "edr-g903 \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "NVD", "id": "CVE-2020-28144" } ] }, "cve": "CVE-2020-28144", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-28144", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-28144", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-28144", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-28144", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2020-28144", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202102-312", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2020-28144", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-28144" }, { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "CNNVD", "id": "CNNVD-202102-312" }, { "db": "NVD", "id": "CVE-2020-28144" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution. plural Moxa EDR The product contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2020-28144" }, { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "VULMON", "id": "CVE-2020-28144" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-28144", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015858", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202102-312", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-28144", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-28144" }, { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "CNNVD", "id": "CNNVD-202102-312" }, { "db": "NVD", "id": "CVE-2020-28144" } ] }, "id": "VAR-202102-0357", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.43948413 }, "last_update_date": "2024-11-23T23:11:08.710000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDR-G903,\u00a0EDR-G902,\u00a0and\u00a0EDR-810\u00a0Secure\u00a0Router\u00a0Vulnerability", "trust": 0.8, "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" }, { "title": "Multiple MOXA Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=140880" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "CNNVD", "id": "CNNVD-202102-312" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.0 }, { "problemtype": "Buffer error (CWE-119) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "NVD", "id": "CVE-2020-28144" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28144" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-28144" }, { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "CNNVD", "id": "CNNVD-202102-312" }, { "db": "NVD", "id": "CVE-2020-28144" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2020-28144" }, { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "CNNVD", "id": "CNNVD-202102-312" }, { "db": "NVD", "id": "CVE-2020-28144" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-03T00:00:00", "db": "VULMON", "id": "CVE-2020-28144" }, { "date": "2021-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "date": "2021-02-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-312" }, { "date": "2021-02-03T13:15:12.653000", "db": "NVD", "id": "CVE-2020-28144" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-05T00:00:00", "db": "VULMON", "id": "CVE-2020-28144" }, { "date": "2021-10-19T08:06:00", "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "date": "2021-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-312" }, { "date": "2024-11-21T05:22:24.607000", "db": "NVD", "id": "CVE-2020-28144" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-312" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Moxa\u00a0EDR\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015858" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-312" } ], "trust": 0.6 } }
var-202007-0403
Vulnerability from variot
Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4). Moxa Provides EDR-G902 Series and EDR-G903 Series Is an industrial secure router.
Moxa EDR-G902 and EDR-G903 have stack buffer overflow vulnerabilities. Attackers can use this vulnerability to execute arbitrary code on the system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0403", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr-g902-t", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g902", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g903-t", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g903", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g902 series", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g903 series", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g902", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g903", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "5.4" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "NVD", "id": "CVE-2020-14511" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:edr-g902_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:edr_g903_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006738" } ] }, "cve": "CVE-2020-14511", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-14511", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2021-76108", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-14511", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA score", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-006738", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-14511", "trust": 1.0, "value": "CRITICAL" }, { "author": "IPA", "id": "JVNDB-2020-006738", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2021-76108", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202007-948", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "CNNVD", "id": "CNNVD-202007-948" }, { "db": "NVD", "id": "CVE-2020-14511" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4). Moxa Provides EDR-G902 Series and EDR-G903 Series Is an industrial secure router. \n\r\n\r\nMoxa EDR-G902 and EDR-G903 have stack buffer overflow vulnerabilities. Attackers can use this vulnerability to execute arbitrary code on the system", "sources": [ { "db": "NVD", "id": "CVE-2020-14511" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "CNVD", "id": "CNVD-2021-76108" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-14511", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-20-196-02", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU98553449", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-006738", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-76108", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47228", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202007-948", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "CNNVD", "id": "CNNVD-202007-948" }, { "db": "NVD", "id": "CVE-2020-14511" } ] }, "id": "VAR-202007-0403", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" } ], "trust": 1.03948413 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" } ] }, "last_update_date": "2024-11-23T22:16:25.991000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisories", "trust": 0.8, "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g902-g903-series-secure-routers-vulnerabilities" }, { "title": "Patch for Moxa EDR-G902 and EDR-G903 stack buffer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/293656" }, { "title": "EDR-G902 and EDR-G903 Series Routers Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=123994" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "CNNVD", "id": "CNNVD-202007-948" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-121", "trust": 1.8 }, { "problemtype": "CWE-787", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "NVD", "id": "CVE-2020-14511" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14511" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-14511" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu98553449/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47228" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "CNNVD", "id": "CNNVD-202007-948" }, { "db": "NVD", "id": "CVE-2020-14511" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-76108" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "CNNVD", "id": "CNNVD-202007-948" }, { "db": "NVD", "id": "CVE-2020-14511" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-11T00:00:00", "db": "CNVD", "id": "CNVD-2021-76108" }, { "date": "2020-07-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "date": "2020-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-948" }, { "date": "2020-07-15T13:15:10.193000", "db": "NVD", "id": "CVE-2020-14511" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-11T00:00:00", "db": "CNVD", "id": "CNVD-2021-76108" }, { "date": "2020-07-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "date": "2021-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-948" }, { "date": "2024-11-21T05:03:25.703000", "db": "NVD", "id": "CVE-2020-14511" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-948" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa Stack-based buffer overflow vulnerability in secure routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006738" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-948" } ], "trust": 0.6 } }