Vulnerabilites related to moxa - edr-g903
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | edr-g903_firmware | * | |
moxa | edr-g903 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78F17387-5413-4188-9336-92559EA65E61", "versionEndExcluding": "3.4.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to cause a denial of service (cold start) by sending two crafted ping requests." }, { "lang": "es", "value": "Dispositivos Moxa Secure Router EDR-G903 en versiones anteriores a 3.4.12 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (arranque en fr\u00edo) enviando dos peticiones de ping manipuladas." } ], "id": "CVE-2016-0878", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-05-31T01:59:03.117", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | edr-g902-t_firmware | * | |
moxa | edr-g902-t | - | |
moxa | edr-g902_firmware | * | |
moxa | edr-g902 | - | |
moxa | edr-g903-t_firmware | * | |
moxa | edr-g903-t | - | |
moxa | edr-g903_firmware | * | |
moxa | edr-g903 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g902-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "181D152B-88C8-46A6-B15A-61C42A8CBF82", "versionEndIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g902-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "917B2620-0DEE-4AE8-978B-237705CAEBCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g902_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04BE1A05-43ED-40EF-AD8C-6FD52CFA24D0", "versionEndIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g902:-:*:*:*:*:*:*:*", "matchCriteriaId": "66893485-6060-432C-8BA7-106CE863A674", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EC3B876-CAD2-46DE-A243-24E12C10F1B0", "versionEndIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B390870B-F5C9-4F31-B19F-A81843C68DBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85C9724D-AE5A-4598-AE3E-9287DC54C4EE", "versionEndIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4)." }, { "lang": "es", "value": "El funcionamiento malicioso de la cookie del navegador web dise\u00f1ada puede causar un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria en el servidor web del sistema en los Enrutadores de la Serie EDR-G902 y EDR-G903 (versiones anteriores a 5.4)" } ], "id": "CVE-2020-14511", "lastModified": "2024-11-21T05:03:25.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-15T13:15:10.193", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | edr-g903_firmware | * | |
moxa | edr-g903 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78F17387-5413-4188-9336-92559EA65E61", "versionEndExcluding": "3.4.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to read configuration and log files via a crafted URL." }, { "lang": "es", "value": "Dispositivos Moxa Secure Router EDR-G903 en versiones anteriores a 3.4.12 permite a atacantes remotos leer archivos de registro y de configuraci\u00f3n a trav\u00e9s de una URL manipulada." } ], "id": "CVE-2016-0875", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-05-31T01:59:00.133", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
moxa | edr_g903_firmware | * | |
moxa | edr_g903_firmware | 1.0 | |
moxa | edr_g903_firmware | 2.0 | |
moxa | edr_g903_firmware | 2.1 | |
moxa | edr-g903 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moxa:edr_g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "073FFA29-3EA2-4A26-8381-9667B3F28A77", "versionEndIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxa:edr_g903_firmware:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "801FAD11-D12C-4B2B-8469-07409254E2AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxa:edr_g903_firmware:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C58E1CB-D824-4ED0-9CD1-6DA14092F5E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxa:edr_g903_firmware:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B629626D-56E2-4D72-BED0-7729B8365DE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere." }, { "lang": "es", "value": "Los routers de la serie Moxa EDR-G903 con firmware anterior a v2.11 no utilizan una fuente suficiente de entrop\u00eda para (1) SSH y (2) llaves SSL, lo que hace que sea m\u00e1s f\u00e1cil para atacantes MITM (man-in-the-middle) a la hora de falsificar un dispositivo o modificar un flujo de datos cliente-servidor mediante el aprovechamiento de conocimiento de una clave de una instalaci\u00f3n del producto en otros lugares." } ], "id": "CVE-2012-4694", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-15T12:09:27.633", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf" }, { "source": "ics-cert@hq.dhs.gov", "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | edr-g903_firmware | * | |
moxa | edr-g903 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78F17387-5413-4188-9336-92559EA65E61", "versionEndExcluding": "3.4.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to discover cleartext passwords by reading a configuration file." }, { "lang": "es", "value": "Dispositivos Moxa Secure Router EDR-G903 en versiones anteriores a 3.4.12 permite a atacantes remotos descubrir contrase\u00f1as en texto plano leyendo un archivo de configuraci\u00f3n." } ], "id": "CVE-2016-0876", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-05-31T01:59:01.100", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | edr-g903_firmware | * | |
moxa | edr-g903 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78F17387-5413-4188-9336-92559EA65E61", "versionEndExcluding": "3.4.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory leak on Moxa Secure Router EDR-G903 devices before 3.4.12 allows remote attackers to cause a denial of service (memory consumption) by executing the ping function." }, { "lang": "es", "value": "Fuga de memoria en dispositivos Moxa Secure Router EDR-G903 en versiones anteriores a 3.4.12 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria) ejecutando la funci\u00f3n ping." } ], "id": "CVE-2016-0877", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-05-31T01:59:02.133", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
moxa | edr-g903_firmware | * | |
moxa | edr-g903 | - | |
moxa | edr-g903-t_firmware | * | |
moxa | edr-g903-t | - | |
moxa | edr-g902_firmware | * | |
moxa | edr-g902 | - | |
moxa | edr-g902-t_firmware | * | |
moxa | edr-g902-t | - | |
moxa | edr-810-vpn-2gsfp_firmware | * | |
moxa | edr-810-vpn-2gsfp | - | |
moxa | edr-810-vpn-2gsfp-t_firmware | * | |
moxa | edr-810-vpn-2gsfp-t | - | |
moxa | edr-810-2gsfp_firmware | * | |
moxa | edr-810-2gsfp | - | |
moxa | edr-810-2gsfp-t_firmware | * | |
moxa | edr-810-2gsfp-t | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA54A9F6-8B3E-4B7F-A608-4353E6D113FA", "versionEndExcluding": "5.7.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05DBA51B-821C-4CBC-97FD-B825089A069B", "versionEndExcluding": "5.7.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B390870B-F5C9-4F31-B19F-A81843C68DBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g902_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3EB1319-6D64-4B13-9798-3013B5D2B021", "versionEndExcluding": "5.7.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g902:-:*:*:*:*:*:*:*", "matchCriteriaId": "66893485-6060-432C-8BA7-106CE863A674", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g902-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6371B449-C90B-4B80-8FE5-3BA3F2D4ADF8", "versionEndExcluding": "5.7.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g902-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "917B2620-0DEE-4AE8-978B-237705CAEBCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-vpn-2gsfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB88BE5F-5436-4EFF-A40C-012306851FD8", "versionEndExcluding": "5.12.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-vpn-2gsfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "846CF4C9-5218-42D5-B10D-BDBFAE7556BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-vpn-2gsfp-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8261100-ECC0-44E0-AF88-D0E2F6ACE0E4", "versionEndExcluding": "5.12.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-vpn-2gsfp-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "154A49C3-905F-412F-8CCE-E35BB67FD703", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-2gsfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57A1AA13-FBFC-490E-B458-061562733DF0", "versionEndExcluding": "5.12.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-2gsfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D800350-748B-40F1-8C28-1C4BDC2FA2CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-2gsfp-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88114-0897-4D63-A585-E9465DA94A10", "versionEndExcluding": "5.12.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-2gsfp-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4668C54-FC34-47CF-A28C-233727686CA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot. \n" }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en Series EDR-810, EDR-G902 y EDR-G903, lo que las hace vulnerables a la vulnerabilidad de denegaci\u00f3n de servicio. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente en el URI, lo que potencialmente permite que usuarios malintencionados activen el reinicio del dispositivo." } ], "id": "CVE-2023-4452", "lastModified": "2024-11-21T08:35:11.450", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "psirt@moxa.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-01T15:15:08.803", "references": [ { "source": "psirt@moxa.com", "tags": [ "Vendor Advisory" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-234880-edr-810-g902-g903-series-web-server-buffer-overflow-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-234880-edr-810-g902-g903-series-web-server-buffer-overflow-vulnerability" } ], "sourceIdentifier": "psirt@moxa.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "psirt@moxa.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
moxa | edr-g903_firmware | * | |
moxa | edr-g903 | - | |
moxa | edr-g903-t_firmware | * | |
moxa | edr-g903-t | - | |
moxa | edr-g902_firmware | * | |
moxa | edr-g902 | - | |
moxa | edr-g902-t_firmware | * | |
moxa | edr-g902-t | - | |
moxa | edr-810-2gsfp_firmware | * | |
moxa | edr-810-2gsfp | - | |
moxa | edr-810-2gsfp-t_firmware | * | |
moxa | edr-810-2gsfp-t | - | |
moxa | edr-810-vpn-2gsfp_firmware | * | |
moxa | edr-810-vpn-2gsfp | - | |
moxa | edr-810-vpn-2gsfp-t_firmware | * | |
moxa | edr-810-vpn-2gsfp-t | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4CEE043-8CC5-47C1-B01B-8E46611EE767", "versionEndIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE987D3F-6CE6-4EA7-862D-89975857832F", "versionEndIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B390870B-F5C9-4F31-B19F-A81843C68DBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g902_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6836BBFB-B8D3-4883-AB6B-F9BD2DC4C672", "versionEndIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g902:-:*:*:*:*:*:*:*", "matchCriteriaId": "66893485-6060-432C-8BA7-106CE863A674", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g902-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F71F037C-1A30-4E0B-969E-6913086F5510", "versionEndIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g902-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "917B2620-0DEE-4AE8-978B-237705CAEBCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-2gsfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EAAD9CE-26E8-4156-9DA7-820039952022", "versionEndIncluding": "5.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-2gsfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D800350-748B-40F1-8C28-1C4BDC2FA2CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-2gsfp-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4B6A686-3F39-448E-8902-805C215E52AA", "versionEndIncluding": "5.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-2gsfp-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4668C54-FC34-47CF-A28C-233727686CA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-vpn-2gsfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC6B27D8-F828-4A79-B2CD-5C15717CC0B2", "versionEndIncluding": "5.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-vpn-2gsfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "846CF4C9-5218-42D5-B10D-BDBFAE7556BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-810-vpn-2gsfp-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "055DF648-DA46-4F45-B87E-624F1F5CBDB4", "versionEndIncluding": "5.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-810-vpn-2gsfp-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "154A49C3-905F-412F-8CCE-E35BB67FD703", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution." }, { "lang": "es", "value": "Determinados productos de Moxa Inc est\u00e1n afectados por una restricci\u00f3n inapropiada de operaciones en EDR-G903 Series Versi\u00f3n de Firmware 5.5 o inferiores, EDR-G902 Series Versi\u00f3n de Firmware 5.5 o inferiores, y EDR-810 Series Versi\u00f3n de Firmware 5.6 o inferiores.\u0026#xa0;Unas peticiones dise\u00f1adas enviadas al dispositivo pueden permitir una ejecuci\u00f3n de c\u00f3digo arbitraria remota" } ], "id": "CVE-2020-28144", "lastModified": "2024-11-21T05:22:24.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-03T13:15:12.653", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | edr-g903_firmware | * | |
moxa | edr-g903 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78F17387-5413-4188-9336-92559EA65E61", "versionEndExcluding": "3.4.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Moxa Secure Router EDR-G903 devices before 3.4.12 do not delete copies of configuration and log files after completing the import function, which allows remote attackers to obtain sensitive information by requesting these files at an unspecified URL." }, { "lang": "es", "value": "Dispositivos Moxa Secure Router EDR-G903 en versiones anteriores a 3.4.12 no elimina las copias de archivos de regitro y de configuraci\u00f3n desp\u00faes de completar la funci\u00f3n import, lo que permite a atacantes remotos obtener informaci\u00f3n sensible solicitando estos archivos en una URL no especificada." } ], "id": "CVE-2016-0879", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-05-31T01:59:04.053", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf | Broken Link, Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | http://www.moxa.com/support/download.aspx?type=support&id=492 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf | Broken Link, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.moxa.com/support/download.aspx?type=support&id=492 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
moxa | edr-g903_firmware | * | |
moxa | edr-g903 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A5A9F90-AD54-41C7-93F3-902AA0E60DD4", "versionEndExcluding": "2.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDB89B47-4598-4F6D-951F-DF546C8CAA96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Moxa EDR-G903 series routers with firmware before 2.11 have a hardcoded account, which allows remote attackers to obtain unspecified device access via unknown vectors." }, { "lang": "es", "value": "Los routers de la serie Moxa EDR-G903 con firmware anterior a v2.11 disponen de una cuenta embebida en el c\u00f3digo fuente (hardcoded), lo que permite a atacantes remotos obtener acceso no especificado al dispositivo a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2012-4712", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-15T12:09:27.850", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Broken Link", "Third Party Advisory", "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2020-14511 (GCVE-0-2020-14511)
Vulnerability from cvelistv5
- CWE-121 - STACK-BASED BUFFER OVERFLOW
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | EDR-G902 and EDR-G903 Series Routers |
Version: Versions prior to 5.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:46:34.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EDR-G902 and EDR-G903 Series Routers", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions prior to 5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-15T12:27:24", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-14511", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EDR-G902 and EDR-G903 Series Routers", "version": { "version_data": [ { "version_value": "Versions prior to 5.4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-14511", "datePublished": "2020-07-15T12:27:24", "dateReserved": "2020-06-19T00:00:00", "dateUpdated": "2024-08-04T12:46:34.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4694 (GCVE-0-2012-4694)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf | x_refsource_MISC | |
http://www.moxa.com/support/download.aspx?type=support&id=492 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:42:55.129Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-15T11:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-4694", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf" }, { "name": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492", "refsource": "CONFIRM", "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-4694", "datePublished": "2013-02-15T11:00:00Z", "dateReserved": "2012-08-28T00:00:00Z", "dateUpdated": "2024-09-16T17:03:16.356Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-28144 (GCVE-0-2020-28144)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:33:57.712Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-03T12:48:41", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-28144", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability", "refsource": "MISC", "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-28144", "datePublished": "2021-02-03T12:48:41", "dateReserved": "2020-11-02T00:00:00", "dateUpdated": "2024-08-04T16:33:57.712Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-0876 (GCVE-0-2016-0876)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:05.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to discover cleartext passwords by reading a configuration file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-05-31T01:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-0876", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to discover cleartext passwords by reading a configuration file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-0876", "datePublished": "2016-05-31T01:00:00", "dateReserved": "2015-12-17T00:00:00", "dateUpdated": "2024-08-05T22:30:05.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-0875 (GCVE-0-2016-0875)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:05.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to read configuration and log files via a crafted URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-05-31T01:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-0875", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to read configuration and log files via a crafted URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-0875", "datePublished": "2016-05-31T01:00:00", "dateReserved": "2015-12-17T00:00:00", "dateUpdated": "2024-08-05T22:30:05.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-0877 (GCVE-0-2016-0877)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:05.049Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak on Moxa Secure Router EDR-G903 devices before 3.4.12 allows remote attackers to cause a denial of service (memory consumption) by executing the ping function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-05-31T01:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-0877", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak on Moxa Secure Router EDR-G903 devices before 3.4.12 allows remote attackers to cause a denial of service (memory consumption) by executing the ping function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-0877", "datePublished": "2016-05-31T01:00:00", "dateReserved": "2015-12-17T00:00:00", "dateUpdated": "2024-08-05T22:30:05.049Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-4452 (GCVE-0-2023-4452)
Vulnerability from cvelistv5
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Moxa | EDR-810 Series |
Version: 1.0 < |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:24:04.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-234880-edr-810-g902-g903-series-web-server-buffer-overflow-vulnerability" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4452", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-05T15:46:43.241172Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-06T18:51:24.564Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "EDR-810 Series ", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "5.12.28", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EDR G902 Series ", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "5.7.20", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "EDR G903 Series ", "vendor": "Moxa", "versions": [ { "lessThanOrEqual": "5.7.20", "status": "affected", "version": "1.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Zhiyuan Chen" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot. \u003c/span\u003e\u003cbr\u003e" } ], "value": "A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot. \n" } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-01T14:24:05.658Z", "orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa", "shortName": "Moxa" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-234880-edr-810-g902-g903-series-web-server-buffer-overflow-vulnerability" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.\u003cbr\u003e\u003cul\u003e\u003cli\u003eEDR-810 Series: Please upgrade to firmware v5.12.29 or later\u003c/li\u003e\u003cli\u003eEDR-G902 Series: Please upgrade to firmware v5.7.21 or later\u003c/li\u003e\u003cli\u003eEDR-G903 Series: Please upgrade to firmware v5.7.21 or later\u003c/li\u003e\u003c/ul\u003e" } ], "value": "Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.\n * EDR-810 Series: Please upgrade to firmware v5.12.29 or later\n * EDR-G902 Series: Please upgrade to firmware v5.7.21 or later\n * EDR-G903 Series: Please upgrade to firmware v5.7.21 or later\n\n\n" } ], "source": { "discovery": "EXTERNAL" }, "title": "Web Server Buffer Overflow Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa", "assignerShortName": "Moxa", "cveId": "CVE-2023-4452", "datePublished": "2023-11-01T14:24:05.658Z", "dateReserved": "2023-08-21T03:25:47.608Z", "dateUpdated": "2024-09-06T18:51:24.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-0878 (GCVE-0-2016-0878)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:05.132Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to cause a denial of service (cold start) by sending two crafted ping requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-05-31T01:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-0878", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to cause a denial of service (cold start) by sending two crafted ping requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-0878", "datePublished": "2016-05-31T01:00:00", "dateReserved": "2015-12-17T00:00:00", "dateUpdated": "2024-08-05T22:30:05.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4712 (GCVE-0-2012-4712)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf | x_refsource_MISC | |
http://www.moxa.com/support/download.aspx?type=support&id=492 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:42:54.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Moxa EDR-G903 series routers with firmware before 2.11 have a hardcoded account, which allows remote attackers to obtain unspecified device access via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-15T11:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-4712", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Moxa EDR-G903 series routers with firmware before 2.11 have a hardcoded account, which allows remote attackers to obtain unspecified device access via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf" }, { "name": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492", "refsource": "CONFIRM", "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-4712", "datePublished": "2013-02-15T11:00:00Z", "dateReserved": "2012-08-28T00:00:00Z", "dateUpdated": "2024-09-16T22:30:19.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-0879 (GCVE-0-2016-0879)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:05.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Moxa Secure Router EDR-G903 devices before 3.4.12 do not delete copies of configuration and log files after completing the import function, which allows remote attackers to obtain sensitive information by requesting these files at an unspecified URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-05-31T01:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-0879", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Moxa Secure Router EDR-G903 devices before 3.4.12 do not delete copies of configuration and log files after completing the import function, which allows remote attackers to obtain sensitive information by requesting these files at an unspecified URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-042-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-0879", "datePublished": "2016-05-31T01:00:00", "dateReserved": "2015-12-17T00:00:00", "dateUpdated": "2024-08-05T22:30:05.073Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202102-0357
Vulnerability from variot
Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution. plural Moxa EDR The product contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0357", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr-810-vpn-2gsfp-t", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.6" }, { "model": "edr-g903", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.5" }, { "model": "edr-810-vpn-2gsfp", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.6" }, { "model": "edr-g903-t", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.5" }, { "model": "edr-g902-t", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.5" }, { "model": "edr-g902", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.5" }, { "model": "edr-810-2gsfp", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.6" }, { "model": "edr-810-2gsfp-t", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.6" }, { "model": "edr-810 \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "edr-g902 \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "edr-g903 \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "NVD", "id": "CVE-2020-28144" } ] }, "cve": "CVE-2020-28144", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-28144", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-28144", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-28144", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-28144", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2020-28144", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202102-312", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2020-28144", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-28144" }, { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "CNNVD", "id": "CNNVD-202102-312" }, { "db": "NVD", "id": "CVE-2020-28144" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution. plural Moxa EDR The product contains a buffer error vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2020-28144" }, { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "VULMON", "id": "CVE-2020-28144" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-28144", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015858", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202102-312", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-28144", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-28144" }, { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "CNNVD", "id": "CNNVD-202102-312" }, { "db": "NVD", "id": "CVE-2020-28144" } ] }, "id": "VAR-202102-0357", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.43948413 }, "last_update_date": "2024-11-23T23:11:08.710000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDR-G903,\u00a0EDR-G902,\u00a0and\u00a0EDR-810\u00a0Secure\u00a0Router\u00a0Vulnerability", "trust": 0.8, "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" }, { "title": "Multiple MOXA Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=140880" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "CNNVD", "id": "CNNVD-202102-312" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.0 }, { "problemtype": "Buffer error (CWE-119) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "NVD", "id": "CVE-2020-28144" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g903-g902-810-secure-router-vulnerability" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28144" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-28144" }, { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "CNNVD", "id": "CNNVD-202102-312" }, { "db": "NVD", "id": "CVE-2020-28144" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2020-28144" }, { "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "db": "CNNVD", "id": "CNNVD-202102-312" }, { "db": "NVD", "id": "CVE-2020-28144" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-03T00:00:00", "db": "VULMON", "id": "CVE-2020-28144" }, { "date": "2021-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "date": "2021-02-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-312" }, { "date": "2021-02-03T13:15:12.653000", "db": "NVD", "id": "CVE-2020-28144" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-05T00:00:00", "db": "VULMON", "id": "CVE-2020-28144" }, { "date": "2021-10-19T08:06:00", "db": "JVNDB", "id": "JVNDB-2020-015858" }, { "date": "2021-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-312" }, { "date": "2024-11-21T05:22:24.607000", "db": "NVD", "id": "CVE-2020-28144" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-312" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Moxa\u00a0EDR\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015858" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-312" } ], "trust": 0.6 } }
var-202007-0403
Vulnerability from variot
Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4). Moxa Provides EDR-G902 Series and EDR-G903 Series Is an industrial secure router.
Moxa EDR-G902 and EDR-G903 have stack buffer overflow vulnerabilities. Attackers can use this vulnerability to execute arbitrary code on the system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0403", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr-g902-t", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g902", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g903-t", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g903", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g902 series", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g903 series", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g902", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "5.4" }, { "model": "edr-g903", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "5.4" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "NVD", "id": "CVE-2020-14511" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:edr-g902_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:edr_g903_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006738" } ] }, "cve": "CVE-2020-14511", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-14511", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2021-76108", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-14511", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA score", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-006738", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-14511", "trust": 1.0, "value": "CRITICAL" }, { "author": "IPA", "id": "JVNDB-2020-006738", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2021-76108", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202007-948", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "CNNVD", "id": "CNNVD-202007-948" }, { "db": "NVD", "id": "CVE-2020-14511" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4). Moxa Provides EDR-G902 Series and EDR-G903 Series Is an industrial secure router. \n\r\n\r\nMoxa EDR-G902 and EDR-G903 have stack buffer overflow vulnerabilities. Attackers can use this vulnerability to execute arbitrary code on the system", "sources": [ { "db": "NVD", "id": "CVE-2020-14511" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "CNVD", "id": "CNVD-2021-76108" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-14511", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-20-196-02", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU98553449", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-006738", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-76108", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47228", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202007-948", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "CNNVD", "id": "CNNVD-202007-948" }, { "db": "NVD", "id": "CVE-2020-14511" } ] }, "id": "VAR-202007-0403", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" } ], "trust": 1.03948413 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" } ] }, "last_update_date": "2024-11-23T22:16:25.991000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisories", "trust": 0.8, "url": "https://www.moxa.com/en/support/support/security-advisory/edr-g902-g903-series-secure-routers-vulnerabilities" }, { "title": "Patch for Moxa EDR-G902 and EDR-G903 stack buffer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/293656" }, { "title": "EDR-G902 and EDR-G903 Series Routers Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=123994" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "CNNVD", "id": "CNNVD-202007-948" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-121", "trust": 1.8 }, { "problemtype": "CWE-787", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "NVD", "id": "CVE-2020-14511" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-196-02" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14511" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-14511" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu98553449/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47228" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-76108" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "CNNVD", "id": "CNNVD-202007-948" }, { "db": "NVD", "id": "CVE-2020-14511" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-76108" }, { "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "db": "CNNVD", "id": "CNNVD-202007-948" }, { "db": "NVD", "id": "CVE-2020-14511" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-11T00:00:00", "db": "CNVD", "id": "CNVD-2021-76108" }, { "date": "2020-07-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "date": "2020-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-948" }, { "date": "2020-07-15T13:15:10.193000", "db": "NVD", "id": "CVE-2020-14511" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-11T00:00:00", "db": "CNVD", "id": "CNVD-2021-76108" }, { "date": "2020-07-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006738" }, { "date": "2021-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-948" }, { "date": "2024-11-21T05:03:25.703000", "db": "NVD", "id": "CVE-2020-14511" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-948" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa Stack-based buffer overflow vulnerability in secure routers", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006738" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-948" } ], "trust": 0.6 } }
var-201302-0026
Vulnerability from variot
Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere. The MOXA EDR-G903 is a series of all-in-one firewall/VPN secure router devices with Gigabit performance. MOXA EDR-G903 is prone to an unauthorized access vulnerability and a weakness in the entropy of the generated key. Successful exploits will allow attackers to gain access to the device and sensitive information. Successful exploits may result in the attacker executing arbitrary commands or gain unauthorized access on the affected system. Moxa EDR-G903 is a security router product from Moxa that integrates firewall/VPN. The vulnerability is caused by the program not using enough resource entropy for (1) SSH and (2) SSL keys. A man-in-the-middle attacker could exploit this vulnerability to counterfeit a device or modify client-server traffic by exploiting keys that the product secures elsewhere. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
TITLE: Moxa EDR-G903 Series Weak Entropy Key Generation Weakness
SECUNIA ADVISORY ID: SA52141
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/52141/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=52141
RELEASE DATE: 2013-02-12
DISCUSS ADVISORY: http://secunia.com/advisories/52141/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/52141/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=52141
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A weakness has been reported in Moxa EDR-G903 Series, which can be exploited by malicious people to conduct brute force attacks.
The weakness is reported in firmware versions prior to 2.11.
SOLUTION: Update to version 2.11.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Neil Smith
ORIGINAL ADVISORY: MOXA: http://www.moxa.com/support/download.aspx?type=support&id=492
ICS-CERT: http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201302-0026", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr g903", "scope": "eq", "trust": 1.6, "vendor": "moxa", "version": "2.0" }, { "model": "edr g903", "scope": "eq", "trust": 1.6, "vendor": "moxa", "version": "2.1" }, { "model": "edr g903", "scope": "eq", "trust": 1.6, "vendor": "moxa", "version": "1.0" }, { "model": "edr-g903", "scope": "eq", "trust": 1.0, "vendor": "moxa", "version": null }, { "model": "edr g903", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.2" }, { "model": "edr-g903 series", "scope": "lt", "trust": 0.8, "vendor": "moxa", "version": "2.11" }, { "model": "edr-g903", "scope": null, "trust": 0.6, "vendor": "moxa", "version": null }, { "model": "edr g903", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.2" }, { "model": "edr-g903", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "2.1" }, { "model": "edr-g903", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "2.11" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-01087" }, { "db": "BID", "id": "57897" }, { "db": "JVNDB", "id": "JVNDB-2012-005933" }, { "db": "CNNVD", "id": "CNNVD-201302-263" }, { "db": "NVD", "id": "CVE-2012-4694" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:edr_g903_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-005933" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Neil Smith", "sources": [ { "db": "BID", "id": "57897" } ], "trust": 0.3 }, "cve": "CVE-2012-4694", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CVE-2012-4694", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "VHN-57975", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-4694", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-4694", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201302-263", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-57975", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-57975" }, { "db": "JVNDB", "id": "JVNDB-2012-005933" }, { "db": "CNNVD", "id": "CNNVD-201302-263" }, { "db": "NVD", "id": "CVE-2012-4694" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere. The MOXA EDR-G903 is a series of all-in-one firewall/VPN secure router devices with Gigabit performance. MOXA EDR-G903 is prone to an unauthorized access vulnerability and a weakness in the entropy of the generated key. \nSuccessful exploits will allow attackers to gain access to the device and sensitive information. Successful exploits may result in the attacker executing arbitrary commands or gain unauthorized access on the affected system. Moxa EDR-G903 is a security router product from Moxa that integrates firewall/VPN. The vulnerability is caused by the program not using enough resource entropy for (1) SSH and (2) SSL keys. A man-in-the-middle attacker could exploit this vulnerability to counterfeit a device or modify client-server traffic by exploiting keys that the product secures elsewhere. ----------------------------------------------------------------------\n\nThe final version of the CSI 6.0 has been released. \nFind out why this is not just another Patch Management solution: http://secunia.com/blog/325/\n\n----------------------------------------------------------------------\n\nTITLE:\nMoxa EDR-G903 Series Weak Entropy Key Generation Weakness\n\nSECUNIA ADVISORY ID:\nSA52141\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/52141/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=52141\n\nRELEASE DATE:\n2013-02-12\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/52141/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/52141/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=52141\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA weakness has been reported in Moxa EDR-G903 Series, which can be\nexploited by malicious people to conduct brute force attacks. \n\nThe weakness is reported in firmware versions prior to 2.11. \n\nSOLUTION:\nUpdate to version 2.11. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Neil Smith\n\nORIGINAL ADVISORY:\nMOXA:\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=492\n\nICS-CERT:\nhttp://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-4694" }, { "db": "JVNDB", "id": "JVNDB-2012-005933" }, { "db": "CNVD", "id": "CNVD-2013-01087" }, { "db": "BID", "id": "57897" }, { "db": "VULHUB", "id": "VHN-57975" }, { "db": "PACKETSTORM", "id": "120261" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSA-13-042-01", "trust": 3.5 }, { "db": "NVD", "id": "CVE-2012-4694", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2012-005933", "trust": 0.8 }, { "db": "SECUNIA", "id": "52141", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201302-263", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2013-01087", "trust": 0.6 }, { "db": "BID", "id": "57897", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-57975", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "120261", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-01087" }, { "db": "VULHUB", "id": "VHN-57975" }, { "db": "BID", "id": "57897" }, { "db": "JVNDB", "id": "JVNDB-2012-005933" }, { "db": "PACKETSTORM", "id": "120261" }, { "db": "CNNVD", "id": "CNNVD-201302-263" }, { "db": "NVD", "id": "CVE-2012-4694" } ] }, "id": "VAR-201302-0026", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-01087" }, { "db": "VULHUB", "id": "VHN-57975" } ], "trust": 1.2873016 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-01087" } ] }, "last_update_date": "2024-11-23T21:45:49.540000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.moxa.com/" }, { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://japan.moxa.com/index.htm" }, { "title": "\u4ee3\u7406\u5e97\u4e00\u89a7", "trust": 0.8, "url": "http://japan.moxa.com/buy/Default.htm#japan" }, { "title": "Firmware for MOXA EDR-G903 series", "trust": 0.8, "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" }, { "title": "MOXA EDR-G903 patch with insufficient entropy vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/31932" }, { "title": "EDR_G903_V2.11", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45361" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-01087" }, { "db": "JVNDB", "id": "JVNDB-2012-005933" }, { "db": "CNNVD", "id": "CNNVD-201302-263" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-57975" }, { "db": "JVNDB", "id": "JVNDB-2012-005933" }, { "db": "NVD", "id": "CVE-2012-4694" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.5, "url": "http://ics-cert.us-cert.gov/pdf/icsa-13-042-01.pdf" }, { "trust": 1.7, "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4694" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4694" }, { "trust": 0.6, "url": "http://secunia.com/advisories/52141" }, { "trust": 0.3, "url": "http://www.moxa.com/product/edr-g903.htm" }, { "trust": 0.1, "url": "http://www.moxa.com/support/download.aspx?type=support\u0026amp;id=492" }, { "trust": 0.1, "url": "http://secunia.com/advisories/52141/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=52141" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/52141/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/blog/325/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-01087" }, { "db": "VULHUB", "id": "VHN-57975" }, { "db": "BID", "id": "57897" }, { "db": "JVNDB", "id": "JVNDB-2012-005933" }, { "db": "PACKETSTORM", "id": "120261" }, { "db": "CNNVD", "id": "CNNVD-201302-263" }, { "db": "NVD", "id": "CVE-2012-4694" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2013-01087" }, { "db": "VULHUB", "id": "VHN-57975" }, { "db": "BID", "id": "57897" }, { "db": "JVNDB", "id": "JVNDB-2012-005933" }, { "db": "PACKETSTORM", "id": "120261" }, { "db": "CNNVD", "id": "CNNVD-201302-263" }, { "db": "NVD", "id": "CVE-2012-4694" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-02-20T00:00:00", "db": "CNVD", "id": "CNVD-2013-01087" }, { "date": "2013-02-15T00:00:00", "db": "VULHUB", "id": "VHN-57975" }, { "date": "2013-02-11T00:00:00", "db": "BID", "id": "57897" }, { "date": "2013-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-005933" }, { "date": "2013-02-13T11:12:30", "db": "PACKETSTORM", "id": "120261" }, { "date": "2013-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201302-263" }, { "date": "2013-02-15T12:09:27.633000", "db": "NVD", "id": "CVE-2012-4694" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-02-20T00:00:00", "db": "CNVD", "id": "CNVD-2013-01087" }, { "date": "2013-02-15T00:00:00", "db": "VULHUB", "id": "VHN-57975" }, { "date": "2013-02-11T00:00:00", "db": "BID", "id": "57897" }, { "date": "2013-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-005933" }, { "date": "2013-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201302-263" }, { "date": "2024-11-21T01:43:22.207000", "db": "NVD", "id": "CVE-2012-4694" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201302-263" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa EDR-G903 Vulnerability impersonating a device in a series router", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-005933" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201302-263" } ], "trust": 0.6 } }
var-201302-0035
Vulnerability from variot
Moxa EDR-G903 series routers with firmware before 2.11 have a hardcoded account, which allows remote attackers to obtain unspecified device access via unknown vectors. The MOXA EDR-G903 is a series of all-in-one firewall/VPN secure router devices with Gigabit performance. The MOXA EDR-G903 series router has a built-in user account and password. MOXA EDR-G903 is prone to an unauthorized access vulnerability and a weakness in the entropy of the generated key. Successful exploits will allow attackers to gain access to the device and sensitive information. Successful exploits may result in the attacker executing arbitrary commands or gain unauthorized access on the affected system. Moxa EDR-G903 is a security router product from Moxa that integrates firewall/VPN. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
TITLE: Moxa EDR-G903 Series Weak Entropy Key Generation Weakness
SECUNIA ADVISORY ID: SA52141
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/52141/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=52141
RELEASE DATE: 2013-02-12
DISCUSS ADVISORY: http://secunia.com/advisories/52141/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/52141/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=52141
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A weakness has been reported in Moxa EDR-G903 Series, which can be exploited by malicious people to conduct brute force attacks.
The weakness is caused due to weak entropy used when generating HTTPS and SSH keys, which can be exploited to brute force the private key based on the host key and disclose sensitive information via Man-in-the-Middle (MitM) attacks.
The weakness is reported in firmware versions prior to 2.11.
SOLUTION: Update to version 2.11.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Neil Smith
ORIGINAL ADVISORY: MOXA: http://www.moxa.com/support/download.aspx?type=support&id=492
ICS-CERT: http://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201302-0035", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr-g903", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "2.11" }, { "model": "edr-g903 series", "scope": "lt", "trust": 0.8, "vendor": "moxa", "version": "2.11" }, { "model": "edr-g903", "scope": null, "trust": 0.6, "vendor": "moxa", "version": null }, { "model": "edr g903", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.1" }, { "model": "edr g903", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.0" }, { "model": "edr g903", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.2" }, { "model": "edr g903", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.0" }, { "model": "edr-g903", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "2.1" }, { "model": "edr-g903", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "2.11" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-01093" }, { "db": "BID", "id": "57897" }, { "db": "JVNDB", "id": "JVNDB-2012-005934" }, { "db": "CNNVD", "id": "CNNVD-201302-266" }, { "db": "NVD", "id": "CVE-2012-4712" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:edr_g903_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-005934" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Neil Smith", "sources": [ { "db": "BID", "id": "57897" } ], "trust": 0.3 }, "cve": "CVE-2012-4712", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2012-4712", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-57993", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-4712", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-4712", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201302-266", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-57993", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2012-4712", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-57993" }, { "db": "VULMON", "id": "CVE-2012-4712" }, { "db": "JVNDB", "id": "JVNDB-2012-005934" }, { "db": "CNNVD", "id": "CNNVD-201302-266" }, { "db": "NVD", "id": "CVE-2012-4712" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa EDR-G903 series routers with firmware before 2.11 have a hardcoded account, which allows remote attackers to obtain unspecified device access via unknown vectors. The MOXA EDR-G903 is a series of all-in-one firewall/VPN secure router devices with Gigabit performance. The MOXA EDR-G903 series router has a built-in user account and password. MOXA EDR-G903 is prone to an unauthorized access vulnerability and a weakness in the entropy of the generated key. \nSuccessful exploits will allow attackers to gain access to the device and sensitive information. Successful exploits may result in the attacker executing arbitrary commands or gain unauthorized access on the affected system. Moxa EDR-G903 is a security router product from Moxa that integrates firewall/VPN. ----------------------------------------------------------------------\n\nThe final version of the CSI 6.0 has been released. \nFind out why this is not just another Patch Management solution: http://secunia.com/blog/325/\n\n----------------------------------------------------------------------\n\nTITLE:\nMoxa EDR-G903 Series Weak Entropy Key Generation Weakness\n\nSECUNIA ADVISORY ID:\nSA52141\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/52141/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=52141\n\nRELEASE DATE:\n2013-02-12\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/52141/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/52141/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=52141\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA weakness has been reported in Moxa EDR-G903 Series, which can be\nexploited by malicious people to conduct brute force attacks. \n\nThe weakness is caused due to weak entropy used when generating HTTPS\nand SSH keys, which can be exploited to brute force the private key\nbased on the host key and disclose sensitive information via\nMan-in-the-Middle (MitM) attacks. \n\nThe weakness is reported in firmware versions prior to 2.11. \n\nSOLUTION:\nUpdate to version 2.11. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nICS-CERT credits Neil Smith\n\nORIGINAL ADVISORY:\nMOXA:\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=492\n\nICS-CERT:\nhttp://ics-cert.us-cert.gov/pdf/ICSA-13-042-01.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-4712" }, { "db": "JVNDB", "id": "JVNDB-2012-005934" }, { "db": "CNVD", "id": "CNVD-2013-01093" }, { "db": "BID", "id": "57897" }, { "db": "VULHUB", "id": "VHN-57993" }, { "db": "VULMON", "id": "CVE-2012-4712" }, { "db": "PACKETSTORM", "id": "120261" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSA-13-042-01", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2012-4712", "trust": 3.5 }, { "db": "JVNDB", "id": "JVNDB-2012-005934", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201302-266", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2013-01093", "trust": 0.6 }, { "db": "BID", "id": "57897", "trust": 0.4 }, { "db": "SECUNIA", "id": "52141", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-57993", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2012-4712", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "120261", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-01093" }, { "db": "VULHUB", "id": "VHN-57993" }, { "db": "VULMON", "id": "CVE-2012-4712" }, { "db": "BID", "id": "57897" }, { "db": "JVNDB", "id": "JVNDB-2012-005934" }, { "db": "PACKETSTORM", "id": "120261" }, { "db": "CNNVD", "id": "CNNVD-201302-266" }, { "db": "NVD", "id": "CVE-2012-4712" } ] }, "id": "VAR-201302-0035", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-01093" }, { "db": "VULHUB", "id": "VHN-57993" } ], "trust": 1.2873016 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-01093" } ] }, "last_update_date": "2024-11-23T21:45:49.581000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.moxa.com/" }, { "title": "\u4ee3\u7406\u5e97\u4e00\u89a7", "trust": 0.8, "url": "http://japan.moxa.com/buy/Default.htm#japan" }, { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://japan.moxa.com/index.htm" }, { "title": "Firmware for MOXA EDR-G903 series", "trust": 0.8, "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" }, { "title": "MOXA EDR-G903 Unauthorized Access Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/31933" }, { "title": "Moxa Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=188971" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-01093" }, { "db": "JVNDB", "id": "JVNDB-2012-005934" }, { "db": "CNNVD", "id": "CNNVD-201302-266" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-798", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-57993" }, { "db": "JVNDB", "id": "JVNDB-2012-005934" }, { "db": "NVD", "id": "CVE-2012-4712" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.6, "url": "http://ics-cert.us-cert.gov/pdf/icsa-13-042-01.pdf" }, { "trust": 1.8, "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=492" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4712" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4712" }, { "trust": 0.3, "url": "http://www.moxa.com/product/edr-g903.htm" }, { "trust": 0.1, "url": "http://www.moxa.com/support/download.aspx?type=support\u0026amp;id=492" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/57897" }, { "trust": 0.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-13-042-01" }, { "trust": 0.1, "url": "http://secunia.com/advisories/52141/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=52141" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/52141/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/blog/325/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-01093" }, { "db": "VULHUB", "id": "VHN-57993" }, { "db": "VULMON", "id": "CVE-2012-4712" }, { "db": "BID", "id": "57897" }, { "db": "JVNDB", "id": "JVNDB-2012-005934" }, { "db": "PACKETSTORM", "id": "120261" }, { "db": "CNNVD", "id": "CNNVD-201302-266" }, { "db": "NVD", "id": "CVE-2012-4712" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2013-01093" }, { "db": "VULHUB", "id": "VHN-57993" }, { "db": "VULMON", "id": "CVE-2012-4712" }, { "db": "BID", "id": "57897" }, { "db": "JVNDB", "id": "JVNDB-2012-005934" }, { "db": "PACKETSTORM", "id": "120261" }, { "db": "CNNVD", "id": "CNNVD-201302-266" }, { "db": "NVD", "id": "CVE-2012-4712" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-02-20T00:00:00", "db": "CNVD", "id": "CNVD-2013-01093" }, { "date": "2013-02-15T00:00:00", "db": "VULHUB", "id": "VHN-57993" }, { "date": "2013-02-15T00:00:00", "db": "VULMON", "id": "CVE-2012-4712" }, { "date": "2013-02-11T00:00:00", "db": "BID", "id": "57897" }, { "date": "2013-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-005934" }, { "date": "2013-02-13T11:12:30", "db": "PACKETSTORM", "id": "120261" }, { "date": "2013-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201302-266" }, { "date": "2013-02-15T12:09:27.850000", "db": "NVD", "id": "CVE-2012-4712" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-02-20T00:00:00", "db": "CNVD", "id": "CNVD-2013-01093" }, { "date": "2013-02-15T00:00:00", "db": "VULHUB", "id": "VHN-57993" }, { "date": "2013-02-15T00:00:00", "db": "VULMON", "id": "CVE-2012-4712" }, { "date": "2013-02-11T00:00:00", "db": "BID", "id": "57897" }, { "date": "2013-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-005934" }, { "date": "2022-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201302-266" }, { "date": "2024-11-21T01:43:24.090000", "db": "NVD", "id": "CVE-2012-4712" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201302-266" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa EDR-G903 Vulnerability in a series router that gains access to unspecified devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-005934" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201302-266" } ], "trust": 0.6 } }
var-201605-0018
Vulnerability from variot
Moxa Secure Router EDR-G903 devices before 3.4.12 do not delete copies of configuration and log files after completing the import function, which allows remote attackers to obtain sensitive information by requesting these files at an unspecified URL. MoxaEDR-G903 is a set of firewall/VPN security router products from Moxa. There are security vulnerabilities in MoxaEDR-G903V3.4.11 and earlier. A privilege-escalation vulnerability 2. An information-disclosure vulnerability 3. A hard coded credentials authentication bypass vulnerability 4. A denial-of-service vulnerability 5. An arbitrary file download vulnerability An attacker can exploit these issues to gain access to bypass certain security restrictions and obtain potentially sensitive information, perform unauthorized actions, or gain elevated privileges on the affected device. Other attacks are also possible. EDR-G903 3.4.11 and and prior are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0018", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr-g903", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "3.4.12" }, { "model": "edr-g903", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "edr-g903 series", "scope": "lt", "trust": 0.8, "vendor": "moxa", "version": "3.4.12" }, { "model": "edr-g903", "scope": "gte", "trust": 0.6, "vendor": "moxa", "version": "3.4.11" }, { "model": "edr-g903", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03392" }, { "db": "JVNDB", "id": "JVNDB-2016-002969" }, { "db": "CNNVD", "id": "CNNVD-201605-434" }, { "db": "NVD", "id": "CVE-2016-0879" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:moxa:edr-g903", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:edr_g903_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002969" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Maxim Rupp", "sources": [ { "db": "BID", "id": "90716" }, { "db": "CNNVD", "id": "CNNVD-201605-434" } ], "trust": 0.9 }, "cve": "CVE-2016-0879", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2016-0879", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-03392", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-88389", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-0879", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-0879", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-0879", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-0879", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-03392", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201605-434", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-88389", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03392" }, { "db": "VULHUB", "id": "VHN-88389" }, { "db": "JVNDB", "id": "JVNDB-2016-002969" }, { "db": "CNNVD", "id": "CNNVD-201605-434" }, { "db": "NVD", "id": "CVE-2016-0879" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa Secure Router EDR-G903 devices before 3.4.12 do not delete copies of configuration and log files after completing the import function, which allows remote attackers to obtain sensitive information by requesting these files at an unspecified URL. MoxaEDR-G903 is a set of firewall/VPN security router products from Moxa. There are security vulnerabilities in MoxaEDR-G903V3.4.11 and earlier. A privilege-escalation vulnerability\n2. An information-disclosure vulnerability\n3. A hard coded credentials authentication bypass vulnerability\n4. A denial-of-service vulnerability\n5. An arbitrary file download vulnerability\nAn attacker can exploit these issues to gain access to bypass certain security restrictions and obtain potentially sensitive information, perform unauthorized actions, or gain elevated privileges on the affected device. Other attacks are also possible. \nEDR-G903 3.4.11 and and prior are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2016-0879" }, { "db": "JVNDB", "id": "JVNDB-2016-002969" }, { "db": "CNVD", "id": "CNVD-2016-03392" }, { "db": "BID", "id": "90716" }, { "db": "VULHUB", "id": "VHN-88389" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-0879", "trust": 3.4 }, { "db": "ICS CERT", "id": "ICSA-16-042-01", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2016-002969", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201605-434", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-03392", "trust": 0.6 }, { "db": "BID", "id": "90716", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-88389", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03392" }, { "db": "VULHUB", "id": "VHN-88389" }, { "db": "BID", "id": "90716" }, { "db": "JVNDB", "id": "JVNDB-2016-002969" }, { "db": "CNNVD", "id": "CNNVD-201605-434" }, { "db": "NVD", "id": "CVE-2016-0879" } ] }, "id": "VAR-201605-0018", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-03392" }, { "db": "VULHUB", "id": "VHN-88389" } ], "trust": 1.2873016 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03392" } ] }, "last_update_date": "2024-11-23T22:30:59.179000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDR-G903 \u30b7\u30ea\u30fc\u30ba", "trust": 0.8, "url": "http://japan.moxa.com/product/EDR-G903.htm" }, { "title": "MoxaEDR-G903 is not authorized to patch vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/76247" }, { "title": "Moxa EDR-G903 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61749" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03392" }, { "db": "JVNDB", "id": "JVNDB-2016-002969" }, { "db": "CNNVD", "id": "CNNVD-201605-434" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-532", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-88389" }, { "db": "JVNDB", "id": "JVNDB-2016-002969" }, { "db": "NVD", "id": "CVE-2016-0879" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-042-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0879" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0879" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03392" }, { "db": "VULHUB", "id": "VHN-88389" }, { "db": "JVNDB", "id": "JVNDB-2016-002969" }, { "db": "CNNVD", "id": "CNNVD-201605-434" }, { "db": "NVD", "id": "CVE-2016-0879" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-03392" }, { "db": "VULHUB", "id": "VHN-88389" }, { "db": "BID", "id": "90716" }, { "db": "JVNDB", "id": "JVNDB-2016-002969" }, { "db": "CNNVD", "id": "CNNVD-201605-434" }, { "db": "NVD", "id": "CVE-2016-0879" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-03392" }, { "date": "2016-05-31T00:00:00", "db": "VULHUB", "id": "VHN-88389" }, { "date": "2016-05-17T00:00:00", "db": "BID", "id": "90716" }, { "date": "2016-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002969" }, { "date": "2016-05-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-434" }, { "date": "2016-05-31T01:59:04.053000", "db": "NVD", "id": "CVE-2016-0879" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-03392" }, { "date": "2016-06-02T00:00:00", "db": "VULHUB", "id": "VHN-88389" }, { "date": "2016-07-06T14:43:00", "db": "BID", "id": "90716" }, { "date": "2016-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002969" }, { "date": "2022-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-434" }, { "date": "2024-11-21T02:42:33.643000", "db": "NVD", "id": "CVE-2016-0879" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-434" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa Secure Router EDR-G903 Vulnerabilities that capture important information on devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002969" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "log information leak", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-434" } ], "trust": 0.6 } }
var-201605-0017
Vulnerability from variot
Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to cause a denial of service (cold start) by sending two crafted ping requests. MoxaEDR-G903 is a set of firewall/VPN security router products from Moxa. There are security vulnerabilities in MoxaEDR-G903V3.4.11 and earlier. A privilege-escalation vulnerability 2. An information-disclosure vulnerability 3. A hard coded credentials authentication bypass vulnerability 4. A denial-of-service vulnerability 5. An arbitrary file download vulnerability An attacker can exploit these issues to gain access to bypass certain security restrictions and obtain potentially sensitive information, perform unauthorized actions, or gain elevated privileges on the affected device. Other attacks are also possible. EDR-G903 3.4.11 and and prior are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0017", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr-g903", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "3.4.12" }, { "model": "edr-g903", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "edr-g903 series", "scope": "lt", "trust": 0.8, "vendor": "moxa", "version": "3.4.12" }, { "model": "edr-g903", "scope": "gte", "trust": 0.6, "vendor": "moxa", "version": "3.4.11" }, { "model": "edr-g903", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03391" }, { "db": "JVNDB", "id": "JVNDB-2016-002953" }, { "db": "CNNVD", "id": "CNNVD-201605-433" }, { "db": "NVD", "id": "CVE-2016-0878" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:moxa:edr-g903", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:edr_g903_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002953" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Maxim Rupp", "sources": [ { "db": "BID", "id": "90716" }, { "db": "CNNVD", "id": "CNNVD-201605-433" } ], "trust": 0.9 }, "cve": "CVE-2016-0878", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2016-0878", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-03391", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-88388", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2016-0878", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-0878", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-0878", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-0878", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-03391", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201605-433", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-88388", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03391" }, { "db": "VULHUB", "id": "VHN-88388" }, { "db": "JVNDB", "id": "JVNDB-2016-002953" }, { "db": "CNNVD", "id": "CNNVD-201605-433" }, { "db": "NVD", "id": "CVE-2016-0878" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to cause a denial of service (cold start) by sending two crafted ping requests. MoxaEDR-G903 is a set of firewall/VPN security router products from Moxa. There are security vulnerabilities in MoxaEDR-G903V3.4.11 and earlier. A privilege-escalation vulnerability\n2. An information-disclosure vulnerability\n3. A hard coded credentials authentication bypass vulnerability\n4. A denial-of-service vulnerability\n5. An arbitrary file download vulnerability\nAn attacker can exploit these issues to gain access to bypass certain security restrictions and obtain potentially sensitive information, perform unauthorized actions, or gain elevated privileges on the affected device. Other attacks are also possible. \nEDR-G903 3.4.11 and and prior are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2016-0878" }, { "db": "JVNDB", "id": "JVNDB-2016-002953" }, { "db": "CNVD", "id": "CNVD-2016-03391" }, { "db": "BID", "id": "90716" }, { "db": "VULHUB", "id": "VHN-88388" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-0878", "trust": 3.4 }, { "db": "ICS CERT", "id": "ICSA-16-042-01", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2016-002953", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201605-433", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-03391", "trust": 0.6 }, { "db": "BID", "id": "90716", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-88388", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03391" }, { "db": "VULHUB", "id": "VHN-88388" }, { "db": "BID", "id": "90716" }, { "db": "JVNDB", "id": "JVNDB-2016-002953" }, { "db": "CNNVD", "id": "CNNVD-201605-433" }, { "db": "NVD", "id": "CVE-2016-0878" } ] }, "id": "VAR-201605-0017", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-03391" }, { "db": "VULHUB", "id": "VHN-88388" } ], "trust": 1.2873016 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03391" } ] }, "last_update_date": "2024-11-23T22:30:59.144000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDR-G903 \u30b7\u30ea\u30fc\u30ba", "trust": 0.8, "url": "http://japan.moxa.com/product/EDR-G903.htm" }, { "title": "MoxaEDR-G903 denial of service vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/76249" }, { "title": "Moxa EDR-G903 Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61748" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03391" }, { "db": "JVNDB", "id": "JVNDB-2016-002953" }, { "db": "CNNVD", "id": "CNNVD-201605-433" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-88388" }, { "db": "JVNDB", "id": "JVNDB-2016-002953" }, { "db": "NVD", "id": "CVE-2016-0878" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-042-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0878" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0878" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03391" }, { "db": "VULHUB", "id": "VHN-88388" }, { "db": "JVNDB", "id": "JVNDB-2016-002953" }, { "db": "CNNVD", "id": "CNNVD-201605-433" }, { "db": "NVD", "id": "CVE-2016-0878" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-03391" }, { "db": "VULHUB", "id": "VHN-88388" }, { "db": "BID", "id": "90716" }, { "db": "JVNDB", "id": "JVNDB-2016-002953" }, { "db": "CNNVD", "id": "CNNVD-201605-433" }, { "db": "NVD", "id": "CVE-2016-0878" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-03391" }, { "date": "2016-05-31T00:00:00", "db": "VULHUB", "id": "VHN-88388" }, { "date": "2016-05-17T00:00:00", "db": "BID", "id": "90716" }, { "date": "2016-06-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002953" }, { "date": "2016-05-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-433" }, { "date": "2016-05-31T01:59:03.117000", "db": "NVD", "id": "CVE-2016-0878" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-03391" }, { "date": "2016-05-31T00:00:00", "db": "VULHUB", "id": "VHN-88388" }, { "date": "2016-07-06T14:43:00", "db": "BID", "id": "90716" }, { "date": "2016-06-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002953" }, { "date": "2022-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-433" }, { "date": "2024-11-21T02:42:33.523000", "db": "NVD", "id": "CVE-2016-0878" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-433" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa EDR-G903 Denial of Service Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2016-03391" }, { "db": "CNNVD", "id": "CNNVD-201605-433" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-433" } ], "trust": 0.6 } }
var-202311-0287
Vulnerability from variot
A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202311-0287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr-810-2gsfp-t", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.12.29" }, { "model": "edr-810-vpn-2gsfp-t", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.12.29" }, { "model": "edr-810-vpn-2gsfp", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.12.29" }, { "model": "edr-g902", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.7.21" }, { "model": "edr-g902-t", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.7.21" }, { "model": "edr-g903", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.7.21" }, { "model": "edr-810-2gsfp", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.12.29" }, { "model": "edr-g903-t", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "5.7.21" } ], "sources": [ { "db": "NVD", "id": "CVE-2023-4452" } ] }, "cve": "CVE-2023-4452", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2023-4452", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "psirt@moxa.com", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2023-4452", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2023-4452", "trust": 1.0, "value": "HIGH" }, { "author": "psirt@moxa.com", "id": "CVE-2023-4452", "trust": 1.0, "value": "MEDIUM" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2023-4452" }, { "db": "NVD", "id": "CVE-2023-4452" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot", "sources": [ { "db": "NVD", "id": "CVE-2023-4452" }, { "db": "VULMON", "id": "CVE-2023-4452" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-4452", "trust": 1.1 }, { "db": "VULMON", "id": "CVE-2023-4452", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-4452" }, { "db": "NVD", "id": "CVE-2023-4452" } ] }, "id": "VAR-202311-0287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.43948413 }, "last_update_date": "2024-08-14T15:36:41.987000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2023-4452" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-234880-edr-810-g902-g903-series-web-server-buffer-overflow-vulnerability" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-4452" }, { "db": "NVD", "id": "CVE-2023-4452" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2023-4452" }, { "db": "NVD", "id": "CVE-2023-4452" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-01T00:00:00", "db": "VULMON", "id": "CVE-2023-4452" }, { "date": "2023-11-01T15:15:08.803000", "db": "NVD", "id": "CVE-2023-4452" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-01T00:00:00", "db": "VULMON", "id": "CVE-2023-4452" }, { "date": "2023-11-09T16:46:36.617000", "db": "NVD", "id": "CVE-2023-4452" } ] } }
var-201605-0016
Vulnerability from variot
Memory leak on Moxa Secure Router EDR-G903 devices before 3.4.12 allows remote attackers to cause a denial of service (memory consumption) by executing the ping function. MoxaEDR-G903 is a set of firewall/VPN security router products from Moxa. There are security vulnerabilities in MoxaEDR-G903V3.4.11 and earlier. A privilege-escalation vulnerability 2. An information-disclosure vulnerability 3. A hard coded credentials authentication bypass vulnerability 4. A denial-of-service vulnerability 5. An arbitrary file download vulnerability An attacker can exploit these issues to gain access to bypass certain security restrictions and obtain potentially sensitive information, perform unauthorized actions, or gain elevated privileges on the affected device. Other attacks are also possible. EDR-G903 3.4.11 and and prior are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0016", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr-g903", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "3.4.12" }, { "model": "edr-g903", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "edr-g903 series", "scope": "lt", "trust": 0.8, "vendor": "moxa", "version": "3.4.12" }, { "model": "edr-g903", "scope": "gte", "trust": 0.6, "vendor": "moxa", "version": "3.4.11" }, { "model": "edr-g903", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03390" }, { "db": "JVNDB", "id": "JVNDB-2016-002952" }, { "db": "CNNVD", "id": "CNNVD-201605-432" }, { "db": "NVD", "id": "CVE-2016-0877" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:moxa:edr-g903", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:edr_g903_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002952" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Maxim Rupp", "sources": [ { "db": "BID", "id": "90716" }, { "db": "CNNVD", "id": "CNNVD-201605-432" } ], "trust": 0.9 }, "cve": "CVE-2016-0877", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2016-0877", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-03390", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-88387", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2016-0877", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-0877", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-0877", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-0877", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-03390", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201605-432", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-88387", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-0877", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03390" }, { "db": "VULHUB", "id": "VHN-88387" }, { "db": "VULMON", "id": "CVE-2016-0877" }, { "db": "JVNDB", "id": "JVNDB-2016-002952" }, { "db": "CNNVD", "id": "CNNVD-201605-432" }, { "db": "NVD", "id": "CVE-2016-0877" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Memory leak on Moxa Secure Router EDR-G903 devices before 3.4.12 allows remote attackers to cause a denial of service (memory consumption) by executing the ping function. MoxaEDR-G903 is a set of firewall/VPN security router products from Moxa. There are security vulnerabilities in MoxaEDR-G903V3.4.11 and earlier. A privilege-escalation vulnerability\n2. An information-disclosure vulnerability\n3. A hard coded credentials authentication bypass vulnerability\n4. A denial-of-service vulnerability\n5. An arbitrary file download vulnerability\nAn attacker can exploit these issues to gain access to bypass certain security restrictions and obtain potentially sensitive information, perform unauthorized actions, or gain elevated privileges on the affected device. Other attacks are also possible. \nEDR-G903 3.4.11 and and prior are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2016-0877" }, { "db": "JVNDB", "id": "JVNDB-2016-002952" }, { "db": "CNVD", "id": "CNVD-2016-03390" }, { "db": "BID", "id": "90716" }, { "db": "VULHUB", "id": "VHN-88387" }, { "db": "VULMON", "id": "CVE-2016-0877" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-0877", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-16-042-01", "trust": 3.2 }, { "db": "JVNDB", "id": "JVNDB-2016-002952", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201605-432", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-03390", "trust": 0.6 }, { "db": "BID", "id": "90716", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-88387", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-0877", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03390" }, { "db": "VULHUB", "id": "VHN-88387" }, { "db": "VULMON", "id": "CVE-2016-0877" }, { "db": "BID", "id": "90716" }, { "db": "JVNDB", "id": "JVNDB-2016-002952" }, { "db": "CNNVD", "id": "CNNVD-201605-432" }, { "db": "NVD", "id": "CVE-2016-0877" } ] }, "id": "VAR-201605-0016", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-03390" }, { "db": "VULHUB", "id": "VHN-88387" } ], "trust": 1.2873016 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03390" } ] }, "last_update_date": "2024-11-23T22:30:59.213000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDR-G903 \u30b7\u30ea\u30fc\u30ba", "trust": 0.8, "url": "http://japan.moxa.com/product/EDR-G903.htm" }, { "title": "MoxaEDR-G903 Memory Leak Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/76250" }, { "title": "Moxa EDR-G903 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61747" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03390" }, { "db": "JVNDB", "id": "JVNDB-2016-002952" }, { "db": "CNNVD", "id": "CNNVD-201605-432" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-772", "trust": 1.0 }, { "problemtype": "CWE-399", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-88387" }, { "db": "JVNDB", "id": "JVNDB-2016-002952" }, { "db": "NVD", "id": "CVE-2016-0877" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-042-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0877" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0877" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/772.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03390" }, { "db": "VULHUB", "id": "VHN-88387" }, { "db": "VULMON", "id": "CVE-2016-0877" }, { "db": "JVNDB", "id": "JVNDB-2016-002952" }, { "db": "CNNVD", "id": "CNNVD-201605-432" }, { "db": "NVD", "id": "CVE-2016-0877" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-03390" }, { "db": "VULHUB", "id": "VHN-88387" }, { "db": "VULMON", "id": "CVE-2016-0877" }, { "db": "BID", "id": "90716" }, { "db": "JVNDB", "id": "JVNDB-2016-002952" }, { "db": "CNNVD", "id": "CNNVD-201605-432" }, { "db": "NVD", "id": "CVE-2016-0877" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-03390" }, { "date": "2016-05-31T00:00:00", "db": "VULHUB", "id": "VHN-88387" }, { "date": "2016-05-31T00:00:00", "db": "VULMON", "id": "CVE-2016-0877" }, { "date": "2016-05-17T00:00:00", "db": "BID", "id": "90716" }, { "date": "2016-06-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002952" }, { "date": "2016-05-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-432" }, { "date": "2016-05-31T01:59:02.133000", "db": "NVD", "id": "CVE-2016-0877" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-03390" }, { "date": "2016-05-31T00:00:00", "db": "VULHUB", "id": "VHN-88387" }, { "date": "2022-04-12T00:00:00", "db": "VULMON", "id": "CVE-2016-0877" }, { "date": "2016-07-06T14:43:00", "db": "BID", "id": "90716" }, { "date": "2016-06-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002952" }, { "date": "2022-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-432" }, { "date": "2024-11-21T02:42:33.397000", "db": "NVD", "id": "CVE-2016-0877" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-432" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa Secure Router EDR-G903 Service disruption on devices (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002952" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-432" } ], "trust": 0.6 } }
var-201605-0014
Vulnerability from variot
Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to read configuration and log files via a crafted URL. MoxaEDR-G903 is a secure router product that integrates firewall/VPN. Moxa EDR-G903 Router is prone to the following security vulnerabilities: 1. A privilege-escalation vulnerability 2. An information-disclosure vulnerability 3. A hard coded credentials authentication bypass vulnerability 4. A denial-of-service vulnerability 5. An arbitrary file download vulnerability An attacker can exploit these issues to gain access to bypass certain security restrictions and obtain potentially sensitive information, perform unauthorized actions, or gain elevated privileges on the affected device. Other attacks are also possible. EDR-G903 3.4.11 and and prior are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0014", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr-g903", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "3.4.12" }, { "model": "edr-g903", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "edr-g903 series", "scope": "lt", "trust": 0.8, "vendor": "moxa", "version": "3.4.12" }, { "model": "edr-g903", "scope": "gte", "trust": 0.6, "vendor": "moxa", "version": "3.4.11" }, { "model": "edr-g903", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03388" }, { "db": "JVNDB", "id": "JVNDB-2016-002951" }, { "db": "CNNVD", "id": "CNNVD-201605-430" }, { "db": "NVD", "id": "CVE-2016-0875" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:moxa:edr-g903", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:edr_g903_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002951" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Maxim Rupp", "sources": [ { "db": "BID", "id": "90716" }, { "db": "CNNVD", "id": "CNNVD-201605-430" } ], "trust": 0.9 }, "cve": "CVE-2016-0875", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-0875", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-03388", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-88385", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-0875", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-0875", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-0875", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-0875", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-03388", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201605-430", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-88385", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03388" }, { "db": "VULHUB", "id": "VHN-88385" }, { "db": "JVNDB", "id": "JVNDB-2016-002951" }, { "db": "CNNVD", "id": "CNNVD-201605-430" }, { "db": "NVD", "id": "CVE-2016-0875" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to read configuration and log files via a crafted URL. MoxaEDR-G903 is a secure router product that integrates firewall/VPN. Moxa EDR-G903 Router is prone to the following security vulnerabilities:\n1. A privilege-escalation vulnerability\n2. An information-disclosure vulnerability\n3. A hard coded credentials authentication bypass vulnerability\n4. A denial-of-service vulnerability\n5. An arbitrary file download vulnerability\nAn attacker can exploit these issues to gain access to bypass certain security restrictions and obtain potentially sensitive information, perform unauthorized actions, or gain elevated privileges on the affected device. Other attacks are also possible. \nEDR-G903 3.4.11 and and prior are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2016-0875" }, { "db": "JVNDB", "id": "JVNDB-2016-002951" }, { "db": "CNVD", "id": "CNVD-2016-03388" }, { "db": "BID", "id": "90716" }, { "db": "VULHUB", "id": "VHN-88385" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-0875", "trust": 3.4 }, { "db": "ICS CERT", "id": "ICSA-16-042-01", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2016-002951", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201605-430", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-03388", "trust": 0.6 }, { "db": "BID", "id": "90716", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-88385", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03388" }, { "db": "VULHUB", "id": "VHN-88385" }, { "db": "BID", "id": "90716" }, { "db": "JVNDB", "id": "JVNDB-2016-002951" }, { "db": "CNNVD", "id": "CNNVD-201605-430" }, { "db": "NVD", "id": "CVE-2016-0875" } ] }, "id": "VAR-201605-0014", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-03388" }, { "db": "VULHUB", "id": "VHN-88385" } ], "trust": 1.2873016 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03388" } ] }, "last_update_date": "2024-11-23T22:30:59.251000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDR-G903 \u30b7\u30ea\u30fc\u30ba", "trust": 0.8, "url": "http://japan.moxa.com/product/EDR-G903.htm" }, { "title": "Patch for MoxaEDR-G903 Information Disclosure Vulnerability (CNVD-2016-03388)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/76237" }, { "title": "Moxa EDR-G903 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61745" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03388" }, { "db": "JVNDB", "id": "JVNDB-2016-002951" }, { "db": "CNNVD", "id": "CNNVD-201605-430" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-532", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-88385" }, { "db": "JVNDB", "id": "JVNDB-2016-002951" }, { "db": "NVD", "id": "CVE-2016-0875" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-042-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0875" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0875" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03388" }, { "db": "VULHUB", "id": "VHN-88385" }, { "db": "JVNDB", "id": "JVNDB-2016-002951" }, { "db": "CNNVD", "id": "CNNVD-201605-430" }, { "db": "NVD", "id": "CVE-2016-0875" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-03388" }, { "db": "VULHUB", "id": "VHN-88385" }, { "db": "BID", "id": "90716" }, { "db": "JVNDB", "id": "JVNDB-2016-002951" }, { "db": "CNNVD", "id": "CNNVD-201605-430" }, { "db": "NVD", "id": "CVE-2016-0875" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-03388" }, { "date": "2016-05-31T00:00:00", "db": "VULHUB", "id": "VHN-88385" }, { "date": "2016-05-17T00:00:00", "db": "BID", "id": "90716" }, { "date": "2016-06-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002951" }, { "date": "2016-05-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-430" }, { "date": "2016-05-31T01:59:00.133000", "db": "NVD", "id": "CVE-2016-0875" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-03388" }, { "date": "2016-05-31T00:00:00", "db": "VULHUB", "id": "VHN-88385" }, { "date": "2016-07-06T14:43:00", "db": "BID", "id": "90716" }, { "date": "2016-06-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002951" }, { "date": "2022-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-430" }, { "date": "2024-11-21T02:42:33.137000", "db": "NVD", "id": "CVE-2016-0875" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-430" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa Secure Router EDR-G903 Device configuration and log file read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002951" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "log information leak", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-430" } ], "trust": 0.6 } }
var-201605-0015
Vulnerability from variot
Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to discover cleartext passwords by reading a configuration file. MoxaEDR-G903 is a set of firewall/VPN security router products from Moxa. There are security vulnerabilities in MoxaEDR-G903V3.4.11 and earlier. A privilege-escalation vulnerability 2. An information-disclosure vulnerability 3. A hard coded credentials authentication bypass vulnerability 4. A denial-of-service vulnerability 5. An arbitrary file download vulnerability An attacker can exploit these issues to gain access to bypass certain security restrictions and obtain potentially sensitive information, perform unauthorized actions, or gain elevated privileges on the affected device. Other attacks are also possible. EDR-G903 3.4.11 and and prior are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0015", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "edr-g903", "scope": "lt", "trust": 1.0, "vendor": "moxa", "version": "3.4.12" }, { "model": "edr-g903", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "edr-g903 series", "scope": "lt", "trust": 0.8, "vendor": "moxa", "version": "3.4.12" }, { "model": "edr-g903", "scope": "gte", "trust": 0.6, "vendor": "moxa", "version": "3.4.11" }, { "model": "edr-g903", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03389" }, { "db": "JVNDB", "id": "JVNDB-2016-002968" }, { "db": "CNNVD", "id": "CNNVD-201605-431" }, { "db": "NVD", "id": "CVE-2016-0876" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:moxa:edr-g903", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:edr_g903_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002968" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Maxim Rupp", "sources": [ { "db": "BID", "id": "90716" }, { "db": "CNNVD", "id": "CNNVD-201605-431" } ], "trust": 0.9 }, "cve": "CVE-2016-0876", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-0876", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-03389", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-88386", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-0876", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-0876", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-0876", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-0876", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-03389", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201605-431", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-88386", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03389" }, { "db": "VULHUB", "id": "VHN-88386" }, { "db": "JVNDB", "id": "JVNDB-2016-002968" }, { "db": "CNNVD", "id": "CNNVD-201605-431" }, { "db": "NVD", "id": "CVE-2016-0876" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to discover cleartext passwords by reading a configuration file. MoxaEDR-G903 is a set of firewall/VPN security router products from Moxa. There are security vulnerabilities in MoxaEDR-G903V3.4.11 and earlier. A privilege-escalation vulnerability\n2. An information-disclosure vulnerability\n3. A hard coded credentials authentication bypass vulnerability\n4. A denial-of-service vulnerability\n5. An arbitrary file download vulnerability\nAn attacker can exploit these issues to gain access to bypass certain security restrictions and obtain potentially sensitive information, perform unauthorized actions, or gain elevated privileges on the affected device. Other attacks are also possible. \nEDR-G903 3.4.11 and and prior are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2016-0876" }, { "db": "JVNDB", "id": "JVNDB-2016-002968" }, { "db": "CNVD", "id": "CNVD-2016-03389" }, { "db": "BID", "id": "90716" }, { "db": "VULHUB", "id": "VHN-88386" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-0876", "trust": 3.4 }, { "db": "ICS CERT", "id": "ICSA-16-042-01", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2016-002968", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201605-431", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-03389", "trust": 0.6 }, { "db": "BID", "id": "90716", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-88386", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03389" }, { "db": "VULHUB", "id": "VHN-88386" }, { "db": "BID", "id": "90716" }, { "db": "JVNDB", "id": "JVNDB-2016-002968" }, { "db": "CNNVD", "id": "CNNVD-201605-431" }, { "db": "NVD", "id": "CVE-2016-0876" } ] }, "id": "VAR-201605-0015", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-03389" }, { "db": "VULHUB", "id": "VHN-88386" } ], "trust": 1.2873016 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03389" } ] }, "last_update_date": "2024-11-23T22:30:59.108000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDR-G903 \u30b7\u30ea\u30fc\u30ba", "trust": 0.8, "url": "http://japan.moxa.com/product/EDR-G903.htm" }, { "title": "MoxaEDR-G903 Information Disclosure Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/76245" }, { "title": "Moxa EDR-G903 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61746" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03389" }, { "db": "JVNDB", "id": "JVNDB-2016-002968" }, { "db": "CNNVD", "id": "CNNVD-201605-431" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-312", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-88386" }, { "db": "JVNDB", "id": "JVNDB-2016-002968" }, { "db": "NVD", "id": "CVE-2016-0876" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-042-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0876" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0876" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-03389" }, { "db": "VULHUB", "id": "VHN-88386" }, { "db": "JVNDB", "id": "JVNDB-2016-002968" }, { "db": "CNNVD", "id": "CNNVD-201605-431" }, { "db": "NVD", "id": "CVE-2016-0876" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-03389" }, { "db": "VULHUB", "id": "VHN-88386" }, { "db": "BID", "id": "90716" }, { "db": "JVNDB", "id": "JVNDB-2016-002968" }, { "db": "CNNVD", "id": "CNNVD-201605-431" }, { "db": "NVD", "id": "CVE-2016-0876" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-03389" }, { "date": "2016-05-31T00:00:00", "db": "VULHUB", "id": "VHN-88386" }, { "date": "2016-05-17T00:00:00", "db": "BID", "id": "90716" }, { "date": "2016-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002968" }, { "date": "2016-05-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-431" }, { "date": "2016-05-31T01:59:01.100000", "db": "NVD", "id": "CVE-2016-0876" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2016-03389" }, { "date": "2016-06-01T00:00:00", "db": "VULHUB", "id": "VHN-88386" }, { "date": "2016-07-06T14:43:00", "db": "BID", "id": "90716" }, { "date": "2016-06-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002968" }, { "date": "2022-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-431" }, { "date": "2024-11-21T02:42:33.260000", "db": "NVD", "id": "CVE-2016-0876" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-431" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa Secure Router EDR-G903 Vulnerability in obtaining plaintext passwords on devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002968" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-431" } ], "trust": 0.6 } }