Vulnerabilites related to moxa - eds-g516e
CVE-2020-6981 (GCVE-0-2020-6981)
Vulnerability from cvelistv5
- CWE-798 - USE OF HARD-CODED CREDENTIALS
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa EDS-G516E Series firmware, Version 5.2 or lower |
Version: Moxa EDS-G516E Series firmware, Version 5.2 or lower |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:03.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa EDS-G516E Series firmware, Version 5.2 or lower", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa EDS-G516E Series firmware, Version 5.2 or lower" } ] } ], "descriptions": [ { "lang": "en", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system without proper authentication." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "USE OF HARD-CODED CREDENTIALS CWE-798", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-24T20:23:48", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-6981", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa EDS-G516E Series firmware, Version 5.2 or lower", "version": { "version_data": [ { "version_value": "Moxa EDS-G516E Series firmware, Version 5.2 or lower" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system without proper authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE OF HARD-CODED CREDENTIALS CWE-798" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-6981", "datePublished": "2020-03-24T20:23:48", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-08-04T09:18:03.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6997 (GCVE-0-2020-6997)
Vulnerability from cvelistv5
- CWE-319 - CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa EDS-G516E Series firmware, Version 5.2 or lower |
Version: Moxa EDS-G516E Series firmware, Version 5.2 or lower |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:02.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa EDS-G516E Series firmware, Version 5.2 or lower", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa EDS-G516E Series firmware, Version 5.2 or lower" } ] } ], "descriptions": [ { "lang": "en", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-24T20:31:59", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-6997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa EDS-G516E Series firmware, Version 5.2 or lower", "version": { "version_data": [ { "version_value": "Moxa EDS-G516E Series firmware, Version 5.2 or lower" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-6997", "datePublished": "2020-03-24T20:31:59", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-08-04T09:18:02.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6979 (GCVE-0-2020-6979)
Vulnerability from cvelistv5
- CWE-321 - USE OF HARD-CODED CRYPTOGRAPHIC KEY
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa EDS-G516E Series firmware, Version 5.2 or lower |
Version: Moxa EDS-G516E Series firmware, Version 5.2 or lower |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:02.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa EDS-G516E Series firmware, Version 5.2 or lower", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa EDS-G516E Series firmware, Version 5.2 or lower" } ] } ], "descriptions": [ { "lang": "en", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-321", "description": "USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-24T20:21:41", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-6979", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa EDS-G516E Series firmware, Version 5.2 or lower", "version": { "version_data": [ { "version_value": "Moxa EDS-G516E Series firmware, Version 5.2 or lower" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-6979", "datePublished": "2020-03-24T20:21:41", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-08-04T09:18:02.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6991 (GCVE-0-2020-6991)
Vulnerability from cvelistv5
- CWE-521 - WEAK PASSWORD REQUIREMENTS
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa EDS-G516E Series firmware, Version 5.2 or lower |
Version: Moxa EDS-G516E Series firmware, Version 5.2 or lower |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:02.508Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa EDS-G516E Series firmware, Version 5.2 or lower", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa EDS-G516E Series firmware, Version 5.2 or lower" } ] } ], "descriptions": [ { "lang": "en", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-521", "description": "WEAK PASSWORD REQUIREMENTS CWE-521", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-24T20:29:40", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-6991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa EDS-G516E Series firmware, Version 5.2 or lower", "version": { "version_data": [ { "version_value": "Moxa EDS-G516E Series firmware, Version 5.2 or lower" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "WEAK PASSWORD REQUIREMENTS CWE-521" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-6991", "datePublished": "2020-03-24T20:29:40", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-08-04T09:18:02.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-7001 (GCVE-0-2020-7001)
Vulnerability from cvelistv5
- CWE-327 - USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa EDS-G516E Series firmware, Version 5.2 or lower |
Version: Moxa EDS-G516E Series firmware, Version 5.2 or lower |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:03.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa EDS-G516E Series firmware, Version 5.2 or lower", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa EDS-G516E Series firmware, Version 5.2 or lower" } ] } ], "descriptions": [ { "lang": "en", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-24T20:15:15", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-7001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa EDS-G516E Series firmware, Version 5.2 or lower", "version": { "version_data": [ { "version_value": "Moxa EDS-G516E Series firmware, Version 5.2 or lower" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-7001", "datePublished": "2020-03-24T20:15:15", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-08-04T09:18:03.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-19707 (GCVE-0-2019-19707)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:12.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.moxa.com/en/support/support/security-advisory/eds-g508e-g512e-g516e-series-ethernet-switches-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-11T01:03:51", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.moxa.com/en/support/support/security-advisory/eds-g508e-g512e-g516e-series-ethernet-switches-vulnerabilities" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19707", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.moxa.com/en/support/support/security-advisory/eds-g508e-g512e-g516e-series-ethernet-switches-vulnerabilities", "refsource": "MISC", "url": "https://www.moxa.com/en/support/support/security-advisory/eds-g508e-g512e-g516e-series-ethernet-switches-vulnerabilities" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19707", "datePublished": "2019-12-11T01:03:51", "dateReserved": "2019-12-11T00:00:00", "dateUpdated": "2024-08-05T02:25:12.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-7007 (GCVE-0-2020-7007)
Vulnerability from cvelistv5
- CWE-121 - STACK-BASED BUFFER OVERFLOW
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa EDS-G516E Series firmware, Version 5.2 or lower |
Version: Moxa EDS-G516E Series firmware, Version 5.2 or lower |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:03.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa EDS-G516E Series firmware, Version 5.2 or lower", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa EDS-G516E Series firmware, Version 5.2 or lower" } ] } ], "descriptions": [ { "lang": "en", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or target the device, causing it to go out of service." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-24T20:12:37", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-7007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa EDS-G516E Series firmware, Version 5.2 or lower", "version": { "version_data": [ { "version_value": "Moxa EDS-G516E Series firmware, Version 5.2 or lower" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or target the device, causing it to go out of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-7007", "datePublished": "2020-03-24T20:12:37", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-08-04T09:18:03.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | eds-g516e_firmware | * | |
moxa | eds-g516e | - | |
moxa | eds-510e_firmware | * | |
moxa | eds-510e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-g516e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FD393F2-B23A-4F2A-85D7-0ED5AEB65A10", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-g516e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FD8F739-ED5B-46A6-A120-1FC17064EB78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-510e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5B049-7DE4-47E7-8DDB-001B1E2B80E2", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-510e:-:*:*:*:*:*:*:*", "matchCriteriaId": "77CC121E-0BC5-4BB9-BDAD-6A95612756C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered." }, { "lang": "es", "value": "En la serie Moxa EDS-G516E firmware, versi\u00f3n 5.2 o por debajo, los productos afectados usan una clave criptogr\u00e1fica embebida, incrementando la posibilidad de que los datos confidenciales puedan ser recuperados." } ], "id": "CVE-2020-6979", "lastModified": "2024-11-21T05:36:25.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-24T21:15:14.660", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-321" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | eds-g516e_firmware | * | |
moxa | eds-g516e | - | |
moxa | eds-510e_firmware | * | |
moxa | eds-510e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-g516e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FD393F2-B23A-4F2A-85D7-0ED5AEB65A10", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-g516e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FD8F739-ED5B-46A6-A120-1FC17064EB78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-510e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5B049-7DE4-47E7-8DDB-001B1E2B80E2", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-510e:-:*:*:*:*:*:*:*", "matchCriteriaId": "77CC121E-0BC5-4BB9-BDAD-6A95612756C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed." }, { "lang": "es", "value": "En la serie Moxa EDS-G516E firmware, versi\u00f3n 5.2 o por debajo, los productos afectados usan un algoritmo criptogr\u00e1fico d\u00e9bil, que puede permitir que informaci\u00f3n confidencial sea divulgada." } ], "id": "CVE-2020-7001", "lastModified": "2024-11-21T05:36:28.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-24T21:15:15.223", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | eds-g516e_firmware | * | |
moxa | eds-g516e | - | |
moxa | eds-510e_firmware | * | |
moxa | eds-510e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-g516e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FD393F2-B23A-4F2A-85D7-0ED5AEB65A10", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-g516e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FD8F739-ED5B-46A6-A120-1FC17064EB78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-510e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5B049-7DE4-47E7-8DDB-001B1E2B80E2", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-510e:-:*:*:*:*:*:*:*", "matchCriteriaId": "77CC121E-0BC5-4BB9-BDAD-6A95612756C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force." }, { "lang": "es", "value": "En la serie Moxa EDS-G516E firmware, versi\u00f3n 5.2 o por debajo, requisitos de contrase\u00f1a d\u00e9biles pueden permitir a un atacante conseguir acceso usando fuerza bruta." } ], "id": "CVE-2020-6991", "lastModified": "2024-11-21T05:36:26.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-24T21:15:15.020", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-521" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-521" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
moxa | eds-g508e_firmware | * | |
moxa | eds-g508e | - | |
moxa | eds-g512e_firmware | * | |
moxa | eds-g512e | - | |
moxa | eds-g516e_firmware | * | |
moxa | eds-g516e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-g508e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2CFA3A1-8D81-44A2-B85A-660DA26DC748", "versionEndIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-g508e:-:*:*:*:*:*:*:*", "matchCriteriaId": "902E4454-8B97-4DC1-8D3F-16516DA259E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-g512e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7020A945-30CB-41F9-959F-E91BE1F2F00B", "versionEndIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-g512e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B89398E6-21CC-49D9-AD9B-343AD58A69FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-g516e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F05DFB71-9217-4E5E-BD7C-B7B4AF419809", "versionEndIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-g516e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FD8F739-ED5B-46A6-A120-1FC17064EB78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets." }, { "lang": "es", "value": "En los dispositivos Moxa EDS-G508E, EDS-G512E y EDS-G516E (con versi\u00f3n de firmware hasta 6.0), una denegaci\u00f3n de servicio puede presentarse por medio de paquetes de descubrimiento de endpoint DCE-RPC de PROFINET ." } ], "id": "CVE-2019-19707", "lastModified": "2024-11-21T04:35:14.117", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-11T02:15:14.683", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.moxa.com/en/support/support/security-advisory/eds-g508e-g512e-g516e-series-ethernet-switches-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.moxa.com/en/support/support/security-advisory/eds-g508e-g512e-g516e-series-ethernet-switches-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | eds-g516e_firmware | * | |
moxa | eds-g516e | - | |
moxa | eds-510e_firmware | * | |
moxa | eds-510e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-g516e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FD393F2-B23A-4F2A-85D7-0ED5AEB65A10", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-g516e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FD8F739-ED5B-46A6-A120-1FC17064EB78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-510e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5B049-7DE4-47E7-8DDB-001B1E2B80E2", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-510e:-:*:*:*:*:*:*:*", "matchCriteriaId": "77CC121E-0BC5-4BB9-BDAD-6A95612756C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system without proper authentication." }, { "lang": "es", "value": "En la serie Moxa EDS-G516E firmware, versi\u00f3n 5.2 o por debajo, un atacante puede conseguir acceso al sistema sin la autenticaci\u00f3n apropiada." } ], "id": "CVE-2020-6981", "lastModified": "2024-11-21T05:36:25.693", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-24T21:15:14.737", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | eds-g516e_firmware | * | |
moxa | eds-g516e | - | |
moxa | eds-510e_firmware | * | |
moxa | eds-510e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-g516e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FD393F2-B23A-4F2A-85D7-0ED5AEB65A10", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-g516e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FD8F739-ED5B-46A6-A120-1FC17064EB78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-510e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5B049-7DE4-47E7-8DDB-001B1E2B80E2", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-510e:-:*:*:*:*:*:*:*", "matchCriteriaId": "77CC121E-0BC5-4BB9-BDAD-6A95612756C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or target the device, causing it to go out of service." }, { "lang": "es", "value": "En la serie Moxa EDS-G516E firmware, versi\u00f3n 5.2 o por debajo, el atacante puede ejecutar c\u00f3digos arbitrarios o apuntar el dispositivo, causando que quede fuera de servicio." } ], "id": "CVE-2020-7007", "lastModified": "2024-11-21T05:36:28.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-24T21:15:15.300", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-04 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
moxa | eds-g516e_firmware | * | |
moxa | eds-g516e | - | |
moxa | eds-510e_firmware | * | |
moxa | eds-510e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-g516e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FD393F2-B23A-4F2A-85D7-0ED5AEB65A10", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-g516e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FD8F739-ED5B-46A6-A120-1FC17064EB78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:eds-510e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD5B049-7DE4-47E7-8DDB-001B1E2B80E2", "versionEndIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:eds-510e:-:*:*:*:*:*:*:*", "matchCriteriaId": "77CC121E-0BC5-4BB9-BDAD-6A95612756C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext." }, { "lang": "es", "value": "En la serie Moxa EDS-G516E firmware, versi\u00f3n 5.2 o por debajo, la informaci\u00f3n confidencial es transmitida por medio de algunas aplicaciones web en texto sin cifrar." } ], "id": "CVE-2020-6997", "lastModified": "2024-11-21T05:36:27.640", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-24T21:15:15.113", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-202003-1597
Vulnerability from variot
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa.
Moxa's EDS-G516E and EDS-510E series have hard-coded vulnerabilities that could be used by attackers to recover confidential data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1597", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "eds-g516e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "eds-g516e", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": "eds-g516e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eds g516e", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eds 510e", "version": "*" } ], "sources": [ { "db": "IVD", "id": "05ac23a8-fa6a-4f54-8359-7314afd236b1" }, { "db": "CNVD", "id": "CNVD-2020-13517" }, { "db": "JVNDB", "id": "JVNDB-2020-003310" }, { "db": "NVD", "id": "CVE-2020-6979" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:eds-510e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:eds-g516e_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003310" } ] }, "cve": "CVE-2020-6979", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-6979", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-003310", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-13517", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "05ac23a8-fa6a-4f54-8359-7314afd236b1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-6979", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003310", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6979", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-003310", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-13517", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202002-1161", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "05ac23a8-fa6a-4f54-8359-7314afd236b1", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "05ac23a8-fa6a-4f54-8359-7314afd236b1" }, { "db": "CNVD", "id": "CNVD-2020-13517" }, { "db": "JVNDB", "id": "JVNDB-2020-003310" }, { "db": "CNNVD", "id": "CNNVD-202002-1161" }, { "db": "NVD", "id": "CVE-2020-6979" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa. \n\r\n\r\nMoxa\u0027s EDS-G516E and EDS-510E series have hard-coded vulnerabilities that could be used by attackers to recover confidential data", "sources": [ { "db": "NVD", "id": "CVE-2020-6979" }, { "db": "JVNDB", "id": "JVNDB-2020-003310" }, { "db": "CNVD", "id": "CNVD-2020-13517" }, { "db": "IVD", "id": "05ac23a8-fa6a-4f54-8359-7314afd236b1" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6979", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-056-04", "trust": 3.0 }, { "db": "CNVD", "id": "CNVD-2020-13517", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-1161", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-003310", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.0726", "trust": 0.6 }, { "db": "IVD", "id": "05AC23A8-FA6A-4F54-8359-7314AFD236B1", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "05ac23a8-fa6a-4f54-8359-7314afd236b1" }, { "db": "CNVD", "id": "CNVD-2020-13517" }, { "db": "JVNDB", "id": "JVNDB-2020-003310" }, { "db": "CNNVD", "id": "CNNVD-202002-1161" }, { "db": "NVD", "id": "CVE-2020-6979" } ] }, "id": "VAR-202003-1597", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "05ac23a8-fa6a-4f54-8359-7314afd236b1" }, { "db": "CNVD", "id": "CNVD-2020-13517" } ], "trust": 1.6518518666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "05ac23a8-fa6a-4f54-8359-7314afd236b1" }, { "db": "CNVD", "id": "CNVD-2020-13517" } ] }, "last_update_date": "2024-11-23T21:36:01.658000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDS-G516E Series", "trust": 0.8, "url": "https://www.moxa.com/en/products/industrial-network-infrastructure/ethernet-switches/layer-2-managed-switches/eds-g516e-series" }, { "title": "Patch for Moxa EDS-G516E and EDS-510E series hardcoded vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/204837" }, { "title": "Moxa EDS-G516E and EDS-510E Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110361" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13517" }, { "db": "JVNDB", "id": "JVNDB-2020-003310" }, { "db": "CNNVD", "id": "CNNVD-202002-1161" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-798", "trust": 1.8 }, { "problemtype": "CWE-321", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003310" }, { "db": "NVD", "id": "CVE-2020-6979" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6979" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6979" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0726/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13517" }, { "db": "JVNDB", "id": "JVNDB-2020-003310" }, { "db": "CNNVD", "id": "CNNVD-202002-1161" }, { "db": "NVD", "id": "CVE-2020-6979" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "05ac23a8-fa6a-4f54-8359-7314afd236b1" }, { "db": "CNVD", "id": "CNVD-2020-13517" }, { "db": "JVNDB", "id": "JVNDB-2020-003310" }, { "db": "CNNVD", "id": "CNNVD-202002-1161" }, { "db": "NVD", "id": "CVE-2020-6979" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-25T00:00:00", "db": "IVD", "id": "05ac23a8-fa6a-4f54-8359-7314afd236b1" }, { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13517" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003310" }, { "date": "2020-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1161" }, { "date": "2020-03-24T21:15:14.660000", "db": "NVD", "id": "CVE-2020-6979" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13517" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003310" }, { "date": "2020-03-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1161" }, { "date": "2024-11-21T05:36:25.467000", "db": "NVD", "id": "CVE-2020-6979" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1161" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa EDS-G516E Vulnerability in using hard-coded credentials in series firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003310" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1161" } ], "trust": 0.6 } }
var-202003-1667
Vulnerability from variot
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa. An attacker can use this vulnerability to obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1667", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "eds-g516e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "eds-g516e", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": "eds-g516e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eds g516e", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eds 510e", "version": "*" } ], "sources": [ { "db": "IVD", "id": "eb9f01e4-ac5f-4bd0-8a5d-99327a66456f" }, { "db": "CNVD", "id": "CNVD-2020-13509" }, { "db": "JVNDB", "id": "JVNDB-2020-003314" }, { "db": "NVD", "id": "CVE-2020-6997" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:eds-510e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:eds-g516e_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003314" } ] }, "cve": "CVE-2020-6997", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-6997", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-003314", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 6.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.4, "id": "CNVD-2020-13509", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:M/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 6.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.4, "id": "eb9f01e4-ac5f-4bd0-8a5d-99327a66456f", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:M/C:C/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-6997", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003314", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6997", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-003314", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-13509", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202002-1159", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "eb9f01e4-ac5f-4bd0-8a5d-99327a66456f", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "eb9f01e4-ac5f-4bd0-8a5d-99327a66456f" }, { "db": "CNVD", "id": "CNVD-2020-13509" }, { "db": "JVNDB", "id": "JVNDB-2020-003314" }, { "db": "CNNVD", "id": "CNNVD-202002-1159" }, { "db": "NVD", "id": "CVE-2020-6997" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa. An attacker can use this vulnerability to obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2020-6997" }, { "db": "JVNDB", "id": "JVNDB-2020-003314" }, { "db": "CNVD", "id": "CNVD-2020-13509" }, { "db": "IVD", "id": "eb9f01e4-ac5f-4bd0-8a5d-99327a66456f" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6997", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-056-04", "trust": 3.0 }, { "db": "CNVD", "id": "CNVD-2020-13509", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-1159", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-003314", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.0726", "trust": 0.6 }, { "db": "IVD", "id": "EB9F01E4-AC5F-4BD0-8A5D-99327A66456F", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "eb9f01e4-ac5f-4bd0-8a5d-99327a66456f" }, { "db": "CNVD", "id": "CNVD-2020-13509" }, { "db": "JVNDB", "id": "JVNDB-2020-003314" }, { "db": "CNNVD", "id": "CNNVD-202002-1159" }, { "db": "NVD", "id": "CVE-2020-6997" } ] }, "id": "VAR-202003-1667", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "eb9f01e4-ac5f-4bd0-8a5d-99327a66456f" }, { "db": "CNVD", "id": "CNVD-2020-13509" } ], "trust": 1.6518518666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "eb9f01e4-ac5f-4bd0-8a5d-99327a66456f" }, { "db": "CNVD", "id": "CNVD-2020-13509" } ] }, "last_update_date": "2024-11-23T21:36:01.322000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDS-G516E Series", "trust": 0.8, "url": "https://www.moxa.com/en/products/industrial-network-infrastructure/ethernet-switches/layer-2-managed-switches/eds-g516e-series" }, { "title": "Patch for Moxa EDS-G516E and EDS-510E series clear text transmission vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/204847" }, { "title": "Moxa EDS-G516E and EDS-510E Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110792" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13509" }, { "db": "JVNDB", "id": "JVNDB-2020-003314" }, { "db": "CNNVD", "id": "CNNVD-202002-1159" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-319", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003314" }, { "db": "NVD", "id": "CVE-2020-6997" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6997" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6997" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0726/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13509" }, { "db": "JVNDB", "id": "JVNDB-2020-003314" }, { "db": "CNNVD", "id": "CNNVD-202002-1159" }, { "db": "NVD", "id": "CVE-2020-6997" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "eb9f01e4-ac5f-4bd0-8a5d-99327a66456f" }, { "db": "CNVD", "id": "CNVD-2020-13509" }, { "db": "JVNDB", "id": "JVNDB-2020-003314" }, { "db": "CNNVD", "id": "CNNVD-202002-1159" }, { "db": "NVD", "id": "CVE-2020-6997" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-25T00:00:00", "db": "IVD", "id": "eb9f01e4-ac5f-4bd0-8a5d-99327a66456f" }, { "date": "2020-02-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-13509" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003314" }, { "date": "2020-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1159" }, { "date": "2020-03-24T21:15:15.113000", "db": "NVD", "id": "CVE-2020-6997" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13509" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003314" }, { "date": "2020-05-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1159" }, { "date": "2024-11-21T05:36:27.640000", "db": "NVD", "id": "CVE-2020-6997" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1159" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa EDS-G516E Vulnerability in plaintext transmission of critical information in series firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003314" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "IVD", "id": "eb9f01e4-ac5f-4bd0-8a5d-99327a66456f" }, { "db": "CNNVD", "id": "CNNVD-202002-1159" } ], "trust": 0.8 } }
var-201912-1342
Vulnerability from variot
On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets. Moxa EDS-G508E , EDS-G512E , EDS-G516E An unspecified vulnerability exists in these devices.Service operation interruption (DoS) There is a possibility of being put into a state. Moxa EDS-G508E, EDS-G512E, and EDS-G516E Series Ethernet Switches are all Ethernet switches manufactured by Moxa.
Moxa EDS-G508E, EDS-G512E, and EDS-G516E Series Ethernet Switches resource management error vulnerability, which could be used by an attacker to cause the target device to stop service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1342", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "eds-g508e", "scope": "lte", "trust": 1.8, "vendor": "moxa", "version": "6.0" }, { "model": "eds-g512e", "scope": "lte", "trust": 1.8, "vendor": "moxa", "version": "6.0" }, { "model": "eds-g516e", "scope": "lte", "trust": 1.8, "vendor": "moxa", "version": "6.0" }, { "model": "eds-g508e", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=6.0" }, { "model": "eds-g516e", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=6.0" }, { "model": "eds-g512e", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=6.0" }, { "model": "eds-g508e", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": null }, { "model": "eds-g512e", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": null }, { "model": "eds-g516e", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03167" }, { "db": "JVNDB", "id": "JVNDB-2019-013131" }, { "db": "CNNVD", "id": "CNNVD-201912-477" }, { "db": "NVD", "id": "CVE-2019-19707" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:eds-g508e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:eds-g512e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:eds-g516e_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013131" } ] }, "cve": "CVE-2019-19707", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2019-19707", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-03167", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-19707", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-19707", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-19707", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-19707", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-03167", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-477", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-19707", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03167" }, { "db": "VULMON", "id": "CVE-2019-19707" }, { "db": "JVNDB", "id": "JVNDB-2019-013131" }, { "db": "CNNVD", "id": "CNNVD-201912-477" }, { "db": "NVD", "id": "CVE-2019-19707" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets. Moxa EDS-G508E , EDS-G512E , EDS-G516E An unspecified vulnerability exists in these devices.Service operation interruption (DoS) There is a possibility of being put into a state. Moxa EDS-G508E, EDS-G512E, and EDS-G516E Series Ethernet Switches are all Ethernet switches manufactured by Moxa. \n\nMoxa EDS-G508E, EDS-G512E, and EDS-G516E Series Ethernet Switches resource management error vulnerability, which could be used by an attacker to cause the target device to stop service", "sources": [ { "db": "NVD", "id": "CVE-2019-19707" }, { "db": "JVNDB", "id": "JVNDB-2019-013131" }, { "db": "CNVD", "id": "CNVD-2020-03167" }, { "db": "VULMON", "id": "CVE-2019-19707" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-19707", "trust": 3.1 }, { "db": "ICS CERT", "id": "ICSA-19-353-01", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2019-013131", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-03167", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4728", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201912-477", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-19707", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03167" }, { "db": "VULMON", "id": "CVE-2019-19707" }, { "db": "JVNDB", "id": "JVNDB-2019-013131" }, { "db": "CNNVD", "id": "CNNVD-201912-477" }, { "db": "NVD", "id": "CVE-2019-19707" } ] }, "id": "VAR-201912-1342", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-03167" } ], "trust": 1.1978196133333334 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03167" } ] }, "last_update_date": "2024-11-23T22:33:38.184000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDS-G508E, EDS-G512E, and EDS-G516E Series Ethernet Switches Vulnerabilities", "trust": 0.8, "url": "https://www.moxa.com/en/support/support/security-advisory/eds-g508e-g512e-g516e-series-ethernet-switches-vulnerabilities" }, { "title": "Patch for Moxa EDS-G508E, EDS-G512E, and EDS-G516E Series Ethernet Switches Resource Management Error Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/198491" }, { "title": "Moxa EDS-G508E , EDS-G512E and EDS-G516E Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=105330" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03167" }, { "db": "JVNDB", "id": "JVNDB-2019-013131" }, { "db": "CNNVD", "id": "CNNVD-201912-477" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2019-19707" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-353-01" }, { "trust": 1.7, "url": "https://www.moxa.com/en/support/support/security-advisory/eds-g508e-g512e-g516e-series-ethernet-switches-vulnerabilities" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19707" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19707" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4728/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03167" }, { "db": "VULMON", "id": "CVE-2019-19707" }, { "db": "JVNDB", "id": "JVNDB-2019-013131" }, { "db": "CNNVD", "id": "CNNVD-201912-477" }, { "db": "NVD", "id": "CVE-2019-19707" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-03167" }, { "db": "VULMON", "id": "CVE-2019-19707" }, { "db": "JVNDB", "id": "JVNDB-2019-013131" }, { "db": "CNNVD", "id": "CNNVD-201912-477" }, { "db": "NVD", "id": "CVE-2019-19707" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-22T00:00:00", "db": "CNVD", "id": "CNVD-2020-03167" }, { "date": "2019-12-11T00:00:00", "db": "VULMON", "id": "CVE-2019-19707" }, { "date": "2019-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013131" }, { "date": "2019-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-477" }, { "date": "2019-12-11T02:15:14.683000", "db": "NVD", "id": "CVE-2019-19707" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-22T00:00:00", "db": "CNVD", "id": "CNVD-2020-03167" }, { "date": "2019-12-17T00:00:00", "db": "VULMON", "id": "CVE-2019-19707" }, { "date": "2019-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013131" }, { "date": "2019-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-477" }, { "date": "2024-11-21T04:35:14.117000", "db": "NVD", "id": "CVE-2019-19707" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-477" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa EDS Vulnerabilities in product devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013131" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-477" } ], "trust": 0.6 } }
var-202003-1669
Vulnerability from variot
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa.
Moxa's EDS-G516E and EDS-510E series have weak cryptographic algorithm vulnerabilities. Attackers can use this vulnerability to obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1669", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "eds-g516e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "eds-g516e", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": "eds-g516e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eds g516e", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eds 510e", "version": "*" } ], "sources": [ { "db": "IVD", "id": "9854f1ff-3e72-4834-a6b7-c6e49f21230a" }, { "db": "CNVD", "id": "CNVD-2020-13516" }, { "db": "JVNDB", "id": "JVNDB-2020-003308" }, { "db": "NVD", "id": "CVE-2020-7001" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:eds-510e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:eds-g516e_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003308" } ] }, "cve": "CVE-2020-7001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-7001", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-003308", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-13516", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "9854f1ff-3e72-4834-a6b7-c6e49f21230a", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-7001", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003308", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-7001", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-003308", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-13516", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202002-1162", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "9854f1ff-3e72-4834-a6b7-c6e49f21230a", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "9854f1ff-3e72-4834-a6b7-c6e49f21230a" }, { "db": "CNVD", "id": "CNVD-2020-13516" }, { "db": "JVNDB", "id": "JVNDB-2020-003308" }, { "db": "CNNVD", "id": "CNNVD-202002-1162" }, { "db": "NVD", "id": "CVE-2020-7001" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa. \n\r\n\r\nMoxa\u0027s EDS-G516E and EDS-510E series have weak cryptographic algorithm vulnerabilities. Attackers can use this vulnerability to obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2020-7001" }, { "db": "JVNDB", "id": "JVNDB-2020-003308" }, { "db": "CNVD", "id": "CNVD-2020-13516" }, { "db": "IVD", "id": "9854f1ff-3e72-4834-a6b7-c6e49f21230a" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-7001", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-056-04", "trust": 3.0 }, { "db": "CNVD", "id": "CNVD-2020-13516", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-1162", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-003308", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.0726", "trust": 0.6 }, { "db": "IVD", "id": "9854F1FF-3E72-4834-A6B7-C6E49F21230A", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "9854f1ff-3e72-4834-a6b7-c6e49f21230a" }, { "db": "CNVD", "id": "CNVD-2020-13516" }, { "db": "JVNDB", "id": "JVNDB-2020-003308" }, { "db": "CNNVD", "id": "CNNVD-202002-1162" }, { "db": "NVD", "id": "CVE-2020-7001" } ] }, "id": "VAR-202003-1669", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "9854f1ff-3e72-4834-a6b7-c6e49f21230a" }, { "db": "CNVD", "id": "CNVD-2020-13516" } ], "trust": 1.6518518666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "9854f1ff-3e72-4834-a6b7-c6e49f21230a" }, { "db": "CNVD", "id": "CNVD-2020-13516" } ] }, "last_update_date": "2024-11-23T21:36:01.531000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDS-G516E Series", "trust": 0.8, "url": "https://www.moxa.com/en/products/industrial-network-infrastructure/ethernet-switches/layer-2-managed-switches/eds-g516e-series" }, { "title": "Patch for Moxa EDS-G516E and EDS-510E series weak password algorithm vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/204835" }, { "title": "Moxa EDS-G516E and EDS-510E Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110362" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13516" }, { "db": "JVNDB", "id": "JVNDB-2020-003308" }, { "db": "CNNVD", "id": "CNNVD-202002-1162" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-327", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003308" }, { "db": "NVD", "id": "CVE-2020-7001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7001" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-7001" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0726/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13516" }, { "db": "JVNDB", "id": "JVNDB-2020-003308" }, { "db": "CNNVD", "id": "CNNVD-202002-1162" }, { "db": "NVD", "id": "CVE-2020-7001" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "9854f1ff-3e72-4834-a6b7-c6e49f21230a" }, { "db": "CNVD", "id": "CNVD-2020-13516" }, { "db": "JVNDB", "id": "JVNDB-2020-003308" }, { "db": "CNNVD", "id": "CNNVD-202002-1162" }, { "db": "NVD", "id": "CVE-2020-7001" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-25T00:00:00", "db": "IVD", "id": "9854f1ff-3e72-4834-a6b7-c6e49f21230a" }, { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13516" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003308" }, { "date": "2020-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1162" }, { "date": "2020-03-24T21:15:15.223000", "db": "NVD", "id": "CVE-2020-7001" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13516" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003308" }, { "date": "2020-03-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1162" }, { "date": "2024-11-21T05:36:28.103000", "db": "NVD", "id": "CVE-2020-7001" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1162" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa EDS-G516E Vulnerability in using cryptographic algorithms in series firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003308" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1162" } ], "trust": 0.6 } }
var-202003-1674
Vulnerability from variot
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or target the device, causing it to go out of service. Moxa EDS-G516E A series firmware contains a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1674", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "eds-g516e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "eds-g516e", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": "eds-g516e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eds g516e", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eds 510e", "version": "*" } ], "sources": [ { "db": "IVD", "id": "dd888719-4ba2-4dfa-b117-2597af1780e1" }, { "db": "CNVD", "id": "CNVD-2020-13515" }, { "db": "JVNDB", "id": "JVNDB-2020-003172" }, { "db": "NVD", "id": "CVE-2020-7007" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:eds-510e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:eds-g516e_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003172" } ] }, "cve": "CVE-2020-7007", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2020-7007", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2020-003172", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-13515", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "dd888719-4ba2-4dfa-b117-2597af1780e1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-7007", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003172", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-7007", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-003172", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-13515", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202002-1163", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "dd888719-4ba2-4dfa-b117-2597af1780e1", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "dd888719-4ba2-4dfa-b117-2597af1780e1" }, { "db": "CNVD", "id": "CNVD-2020-13515" }, { "db": "JVNDB", "id": "JVNDB-2020-003172" }, { "db": "CNNVD", "id": "CNNVD-202002-1163" }, { "db": "NVD", "id": "CVE-2020-7007" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or target the device, causing it to go out of service. Moxa EDS-G516E A series firmware contains a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa", "sources": [ { "db": "NVD", "id": "CVE-2020-7007" }, { "db": "JVNDB", "id": "JVNDB-2020-003172" }, { "db": "CNVD", "id": "CNVD-2020-13515" }, { "db": "IVD", "id": "dd888719-4ba2-4dfa-b117-2597af1780e1" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-7007", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-056-04", "trust": 3.0 }, { "db": "CNVD", "id": "CNVD-2020-13515", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-1163", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-003172", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.0726", "trust": 0.6 }, { "db": "IVD", "id": "DD888719-4BA2-4DFA-B117-2597AF1780E1", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "dd888719-4ba2-4dfa-b117-2597af1780e1" }, { "db": "CNVD", "id": "CNVD-2020-13515" }, { "db": "JVNDB", "id": "JVNDB-2020-003172" }, { "db": "CNNVD", "id": "CNNVD-202002-1163" }, { "db": "NVD", "id": "CVE-2020-7007" } ] }, "id": "VAR-202003-1674", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "dd888719-4ba2-4dfa-b117-2597af1780e1" }, { "db": "CNVD", "id": "CNVD-2020-13515" } ], "trust": 1.6518518666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "dd888719-4ba2-4dfa-b117-2597af1780e1" }, { "db": "CNVD", "id": "CNVD-2020-13515" } ] }, "last_update_date": "2024-11-23T21:36:01.626000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDS-G516E Series", "trust": 0.8, "url": "https://www.moxa.com/en/products/industrial-network-infrastructure/ethernet-switches/layer-2-managed-switches/eds-g516e-series" }, { "title": "Patch for Moxa EDS-G516E and EDS-510E series Buffer Overflow Vulnerability (CNVD-2020-13515)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/204831" }, { "title": "Moxa EDS-G516E and EDS-510E Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110363" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13515" }, { "db": "JVNDB", "id": "JVNDB-2020-003172" }, { "db": "CNNVD", "id": "CNNVD-202002-1163" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 }, { "problemtype": "CWE-121", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003172" }, { "db": "NVD", "id": "CVE-2020-7007" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7007" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-7007" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0726/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13515" }, { "db": "JVNDB", "id": "JVNDB-2020-003172" }, { "db": "CNNVD", "id": "CNNVD-202002-1163" }, { "db": "NVD", "id": "CVE-2020-7007" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "dd888719-4ba2-4dfa-b117-2597af1780e1" }, { "db": "CNVD", "id": "CNVD-2020-13515" }, { "db": "JVNDB", "id": "JVNDB-2020-003172" }, { "db": "CNNVD", "id": "CNNVD-202002-1163" }, { "db": "NVD", "id": "CVE-2020-7007" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-25T00:00:00", "db": "IVD", "id": "dd888719-4ba2-4dfa-b117-2597af1780e1" }, { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13515" }, { "date": "2020-04-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003172" }, { "date": "2020-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1163" }, { "date": "2020-03-24T21:15:15.300000", "db": "NVD", "id": "CVE-2020-7007" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-02T00:00:00", "db": "CNVD", "id": "CNVD-2020-13515" }, { "date": "2020-04-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003172" }, { "date": "2020-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1163" }, { "date": "2024-11-21T05:36:28.860000", "db": "NVD", "id": "CVE-2020-7007" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1163" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa EDS-G516E Out-of-bounds write vulnerabilities in series firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003172" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "dd888719-4ba2-4dfa-b117-2597af1780e1" }, { "db": "CNNVD", "id": "CNNVD-202002-1163" } ], "trust": 0.8 } }
var-202003-1614
Vulnerability from variot
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force. Moxa EDS-G516E The series firmware contains a vulnerability related to the request for a weak password.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa.
Moxa's EDS-G516E and EDS-510E series have weak password vulnerabilities. Attackers can use this vulnerability to obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1614", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "eds-g516e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "eds-g516e", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": "eds-g516e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eds g516e", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eds 510e", "version": "*" } ], "sources": [ { "db": "IVD", "id": "3db247f7-d599-44ca-8dfb-82369bafe2c9" }, { "db": "CNVD", "id": "CNVD-2020-13510" }, { "db": "JVNDB", "id": "JVNDB-2020-003313" }, { "db": "NVD", "id": "CVE-2020-6991" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:eds-510e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:eds-g516e_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003313" } ] }, "cve": "CVE-2020-6991", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-6991", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-003313", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-13510", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "3db247f7-d599-44ca-8dfb-82369bafe2c9", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-6991", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003313", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6991", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-003313", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-13510", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202002-1158", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "3db247f7-d599-44ca-8dfb-82369bafe2c9", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "3db247f7-d599-44ca-8dfb-82369bafe2c9" }, { "db": "CNVD", "id": "CNVD-2020-13510" }, { "db": "JVNDB", "id": "JVNDB-2020-003313" }, { "db": "CNNVD", "id": "CNNVD-202002-1158" }, { "db": "NVD", "id": "CVE-2020-6991" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force. Moxa EDS-G516E The series firmware contains a vulnerability related to the request for a weak password.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa. \n\r\n\r\nMoxa\u0027s EDS-G516E and EDS-510E series have weak password vulnerabilities. Attackers can use this vulnerability to obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2020-6991" }, { "db": "JVNDB", "id": "JVNDB-2020-003313" }, { "db": "CNVD", "id": "CNVD-2020-13510" }, { "db": "IVD", "id": "3db247f7-d599-44ca-8dfb-82369bafe2c9" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6991", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-056-04", "trust": 3.0 }, { "db": "CNVD", "id": "CNVD-2020-13510", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-1158", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-003313", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.0726", "trust": 0.6 }, { "db": "IVD", "id": "3DB247F7-D599-44CA-8DFB-82369BAFE2C9", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "3db247f7-d599-44ca-8dfb-82369bafe2c9" }, { "db": "CNVD", "id": "CNVD-2020-13510" }, { "db": "JVNDB", "id": "JVNDB-2020-003313" }, { "db": "CNNVD", "id": "CNNVD-202002-1158" }, { "db": "NVD", "id": "CVE-2020-6991" } ] }, "id": "VAR-202003-1614", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "3db247f7-d599-44ca-8dfb-82369bafe2c9" }, { "db": "CNVD", "id": "CNVD-2020-13510" } ], "trust": 1.6518518666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "3db247f7-d599-44ca-8dfb-82369bafe2c9" }, { "db": "CNVD", "id": "CNVD-2020-13510" } ] }, "last_update_date": "2024-11-23T21:36:01.562000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDS-G516E Series", "trust": 0.8, "url": "https://www.moxa.com/en/products/industrial-network-infrastructure/ethernet-switches/layer-2-managed-switches/eds-g516e-series" }, { "title": "Patch for Moxa EDS-G516E and EDS-510E series weak password vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/204849" }, { "title": "Moxa EDS-G516E and EDS-510E Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110358" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13510" }, { "db": "JVNDB", "id": "JVNDB-2020-003313" }, { "db": "CNNVD", "id": "CNNVD-202002-1158" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-521", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003313" }, { "db": "NVD", "id": "CVE-2020-6991" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6991" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6991" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0726/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13510" }, { "db": "JVNDB", "id": "JVNDB-2020-003313" }, { "db": "CNNVD", "id": "CNNVD-202002-1158" }, { "db": "NVD", "id": "CVE-2020-6991" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "3db247f7-d599-44ca-8dfb-82369bafe2c9" }, { "db": "CNVD", "id": "CNVD-2020-13510" }, { "db": "JVNDB", "id": "JVNDB-2020-003313" }, { "db": "CNNVD", "id": "CNNVD-202002-1158" }, { "db": "NVD", "id": "CVE-2020-6991" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-25T00:00:00", "db": "IVD", "id": "3db247f7-d599-44ca-8dfb-82369bafe2c9" }, { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13510" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003313" }, { "date": "2020-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1158" }, { "date": "2020-03-24T21:15:15.020000", "db": "NVD", "id": "CVE-2020-6991" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13510" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003313" }, { "date": "2020-03-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1158" }, { "date": "2024-11-21T05:36:26.910000", "db": "NVD", "id": "CVE-2020-6991" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1158" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa EDS-G516E Vulnerability in requesting weak passwords in series firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003313" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "IVD", "id": "3db247f7-d599-44ca-8dfb-82369bafe2c9" }, { "db": "CNNVD", "id": "CNNVD-202002-1158" } ], "trust": 0.8 } }
var-202003-1668
Vulnerability from variot
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, some of the parameters in the setting pages do not ensure text is the correct size for its buffer. Moxa EDS-G516E A classic buffer overflow vulnerability exists in the series firmware.Service operation interruption (DoS) It may be put into a state. Moxa EDS-G516E is a managed switch from Moxa, Taiwan. The vulnerability stems from the fact that when a network system or product performs an operation on memory, the data boundary is not correctly verified, resulting in an incorrect read and write operation to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1668", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mds-g516e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-g516e", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "5.2" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "mds g516e", "version": "*" }, { "model": "eds-g516e", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" } ], "sources": [ { "db": "IVD", "id": "84df500c-409c-46cd-8c19-9a913469f3e3" }, { "db": "IVD", "id": "9dedd6d9-6012-4511-9f7c-c0f8518a4ab3" }, { "db": "IVD", "id": "b6594321-ddb7-44b7-8b8e-0ffc0c94d3a0" }, { "db": "CNVD", "id": "CNVD-2020-19932" }, { "db": "JVNDB", "id": "JVNDB-2020-003425" }, { "db": "NVD", "id": "CVE-2020-6999" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:eds-g516e_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003425" } ] }, "cve": "CVE-2020-6999", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2020-6999", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-003425", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-19932", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "84df500c-409c-46cd-8c19-9a913469f3e3", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "9dedd6d9-6012-4511-9f7c-c0f8518a4ab3", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "b6594321-ddb7-44b7-8b8e-0ffc0c94d3a0", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2020-6999", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-003425", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6999", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-003425", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-19932", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202003-1630", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "84df500c-409c-46cd-8c19-9a913469f3e3", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "9dedd6d9-6012-4511-9f7c-c0f8518a4ab3", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "b6594321-ddb7-44b7-8b8e-0ffc0c94d3a0", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "84df500c-409c-46cd-8c19-9a913469f3e3" }, { "db": "IVD", "id": "9dedd6d9-6012-4511-9f7c-c0f8518a4ab3" }, { "db": "IVD", "id": "b6594321-ddb7-44b7-8b8e-0ffc0c94d3a0" }, { "db": "CNVD", "id": "CNVD-2020-19932" }, { "db": "JVNDB", "id": "JVNDB-2020-003425" }, { "db": "CNNVD", "id": "CNNVD-202003-1630" }, { "db": "NVD", "id": "CVE-2020-6999" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, some of the parameters in the setting pages do not ensure text is the correct size for its buffer. Moxa EDS-G516E A classic buffer overflow vulnerability exists in the series firmware.Service operation interruption (DoS) It may be put into a state. Moxa EDS-G516E is a managed switch from Moxa, Taiwan. The vulnerability stems from the fact that when a network system or product performs an operation on memory, the data boundary is not correctly verified, resulting in an incorrect read and write operation to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow", "sources": [ { "db": "NVD", "id": "CVE-2020-6999" }, { "db": "JVNDB", "id": "JVNDB-2020-003425" }, { "db": "CNVD", "id": "CNVD-2020-19932" }, { "db": "IVD", "id": "84df500c-409c-46cd-8c19-9a913469f3e3" }, { "db": "IVD", "id": "9dedd6d9-6012-4511-9f7c-c0f8518a4ab3" }, { "db": "IVD", "id": "b6594321-ddb7-44b7-8b8e-0ffc0c94d3a0" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6999", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-20-056-04", "trust": 2.4 }, { "db": "CNVD", "id": "CNVD-2020-19932", "trust": 1.2 }, { "db": "CNNVD", "id": "CNNVD-202003-1630", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2020-003425", "trust": 0.8 }, { "db": "IVD", "id": "84DF500C-409C-46CD-8C19-9A913469F3E3", "trust": 0.2 }, { "db": "IVD", "id": "9DEDD6D9-6012-4511-9F7C-C0F8518A4AB3", "trust": 0.2 }, { "db": "IVD", "id": "B6594321-DDB7-44B7-8B8E-0FFC0C94D3A0", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "84df500c-409c-46cd-8c19-9a913469f3e3" }, { "db": "IVD", "id": "9dedd6d9-6012-4511-9f7c-c0f8518a4ab3" }, { "db": "IVD", "id": "b6594321-ddb7-44b7-8b8e-0ffc0c94d3a0" }, { "db": "CNVD", "id": "CNVD-2020-19932" }, { "db": "JVNDB", "id": "JVNDB-2020-003425" }, { "db": "CNNVD", "id": "CNNVD-202003-1630" }, { "db": "NVD", "id": "CVE-2020-6999" } ] }, "id": "VAR-202003-1668", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "84df500c-409c-46cd-8c19-9a913469f3e3" }, { "db": "IVD", "id": "9dedd6d9-6012-4511-9f7c-c0f8518a4ab3" }, { "db": "IVD", "id": "b6594321-ddb7-44b7-8b8e-0ffc0c94d3a0" }, { "db": "CNVD", "id": "CNVD-2020-19932" } ], "trust": 1.7555556 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "IVD", "id": "84df500c-409c-46cd-8c19-9a913469f3e3" }, { "db": "IVD", "id": "9dedd6d9-6012-4511-9f7c-c0f8518a4ab3" }, { "db": "IVD", "id": "b6594321-ddb7-44b7-8b8e-0ffc0c94d3a0" }, { "db": "CNVD", "id": "CNVD-2020-19932" } ] }, "last_update_date": "2024-11-23T21:36:01.424000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.moxa.com/en/" }, { "title": "Patch for Moxa EDS-G516E buffer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/211331" }, { "title": "Moxa EDS-G516E Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=113032" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-19932" }, { "db": "JVNDB", "id": "JVNDB-2020-003425" }, { "db": "CNNVD", "id": "CNNVD-202003-1630" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003425" }, { "db": "NVD", "id": "CVE-2020-6999" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6999" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6999" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003425" }, { "db": "CNNVD", "id": "CNNVD-202003-1630" }, { "db": "NVD", "id": "CVE-2020-6999" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "84df500c-409c-46cd-8c19-9a913469f3e3" }, { "db": "IVD", "id": "9dedd6d9-6012-4511-9f7c-c0f8518a4ab3" }, { "db": "IVD", "id": "b6594321-ddb7-44b7-8b8e-0ffc0c94d3a0" }, { "db": "CNVD", "id": "CNVD-2020-19932" }, { "db": "JVNDB", "id": "JVNDB-2020-003425" }, { "db": "CNNVD", "id": "CNNVD-202003-1630" }, { "db": "NVD", "id": "CVE-2020-6999" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-26T00:00:00", "db": "IVD", "id": "84df500c-409c-46cd-8c19-9a913469f3e3" }, { "date": "2020-03-26T00:00:00", "db": "IVD", "id": "9dedd6d9-6012-4511-9f7c-c0f8518a4ab3" }, { "date": "2020-03-26T00:00:00", "db": "IVD", "id": "b6594321-ddb7-44b7-8b8e-0ffc0c94d3a0" }, { "date": "2020-03-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-19932" }, { "date": "2020-04-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003425" }, { "date": "2020-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-1630" }, { "date": "2020-03-26T13:15:13.610000", "db": "NVD", "id": "CVE-2020-6999" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2020-19932" }, { "date": "2020-04-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003425" }, { "date": "2020-03-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-1630" }, { "date": "2024-11-21T05:36:27.883000", "db": "NVD", "id": "CVE-2020-6999" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-1630" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa EDS-G516E Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "84df500c-409c-46cd-8c19-9a913469f3e3" }, { "db": "IVD", "id": "9dedd6d9-6012-4511-9f7c-c0f8518a4ab3" }, { "db": "IVD", "id": "b6594321-ddb7-44b7-8b8e-0ffc0c94d3a0" }, { "db": "CNVD", "id": "CNVD-2020-19932" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "84df500c-409c-46cd-8c19-9a913469f3e3" }, { "db": "IVD", "id": "9dedd6d9-6012-4511-9f7c-c0f8518a4ab3" }, { "db": "IVD", "id": "b6594321-ddb7-44b7-8b8e-0ffc0c94d3a0" }, { "db": "CNNVD", "id": "CNNVD-202003-1630" } ], "trust": 1.2 } }
var-202003-1599
Vulnerability from variot
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system without proper authentication. Moxa EDS-G516E A vulnerability exists in the series firmware regarding the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1599", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "eds-g516e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "eds-g516e", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "5.2" }, { "model": "eds-510e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": "eds-g516e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eds g516e", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "eds 510e", "version": "*" } ], "sources": [ { "db": "IVD", "id": "255e7d54-94bc-4d44-97ee-490edf87c4ca" }, { "db": "CNVD", "id": "CNVD-2020-13518" }, { "db": "JVNDB", "id": "JVNDB-2020-003311" }, { "db": "NVD", "id": "CVE-2020-6981" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:eds-510e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:eds-g516e_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003311" } ] }, "cve": "CVE-2020-6981", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2020-6981", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2020-003311", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-13518", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "255e7d54-94bc-4d44-97ee-490edf87c4ca", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-6981", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003311", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6981", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-003311", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-13518", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202002-1160", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "255e7d54-94bc-4d44-97ee-490edf87c4ca", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "255e7d54-94bc-4d44-97ee-490edf87c4ca" }, { "db": "CNVD", "id": "CNVD-2020-13518" }, { "db": "JVNDB", "id": "JVNDB-2020-003311" }, { "db": "CNNVD", "id": "CNNVD-202002-1160" }, { "db": "NVD", "id": "CVE-2020-6981" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system without proper authentication. Moxa EDS-G516E A vulnerability exists in the series firmware regarding the use of hard-coded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa", "sources": [ { "db": "NVD", "id": "CVE-2020-6981" }, { "db": "JVNDB", "id": "JVNDB-2020-003311" }, { "db": "CNVD", "id": "CNVD-2020-13518" }, { "db": "IVD", "id": "255e7d54-94bc-4d44-97ee-490edf87c4ca" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6981", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-056-04", "trust": 3.0 }, { "db": "CNVD", "id": "CNVD-2020-13518", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-1160", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-003311", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.0726", "trust": 0.6 }, { "db": "IVD", "id": "255E7D54-94BC-4D44-97EE-490EDF87C4CA", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "255e7d54-94bc-4d44-97ee-490edf87c4ca" }, { "db": "CNVD", "id": "CNVD-2020-13518" }, { "db": "JVNDB", "id": "JVNDB-2020-003311" }, { "db": "CNNVD", "id": "CNNVD-202002-1160" }, { "db": "NVD", "id": "CVE-2020-6981" } ] }, "id": "VAR-202003-1599", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "255e7d54-94bc-4d44-97ee-490edf87c4ca" }, { "db": "CNVD", "id": "CNVD-2020-13518" } ], "trust": 1.6518518666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "255e7d54-94bc-4d44-97ee-490edf87c4ca" }, { "db": "CNVD", "id": "CNVD-2020-13518" } ] }, "last_update_date": "2024-11-23T21:36:01.463000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "EDS-G516E Series", "trust": 0.8, "url": "https://www.moxa.com/en/products/industrial-network-infrastructure/ethernet-switches/layer-2-managed-switches/eds-g516e-series" }, { "title": "Patch for Moxa EDS-G516E and EDS-510E series hard certificate vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/204841" }, { "title": "Moxa EDS-G516E and EDS-510E Repair measures for trust management problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110360" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13518" }, { "db": "JVNDB", "id": "JVNDB-2020-003311" }, { "db": "CNNVD", "id": "CNNVD-202002-1160" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-798", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003311" }, { "db": "NVD", "id": "CVE-2020-6981" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6981" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6981" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0726/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13518" }, { "db": "JVNDB", "id": "JVNDB-2020-003311" }, { "db": "CNNVD", "id": "CNNVD-202002-1160" }, { "db": "NVD", "id": "CVE-2020-6981" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "255e7d54-94bc-4d44-97ee-490edf87c4ca" }, { "db": "CNVD", "id": "CNVD-2020-13518" }, { "db": "JVNDB", "id": "JVNDB-2020-003311" }, { "db": "CNNVD", "id": "CNNVD-202002-1160" }, { "db": "NVD", "id": "CVE-2020-6981" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-25T00:00:00", "db": "IVD", "id": "255e7d54-94bc-4d44-97ee-490edf87c4ca" }, { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13518" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003311" }, { "date": "2020-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1160" }, { "date": "2020-03-24T21:15:14.737000", "db": "NVD", "id": "CVE-2020-6981" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13518" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003311" }, { "date": "2020-03-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1160" }, { "date": "2024-11-21T05:36:25.693000", "db": "NVD", "id": "CVE-2020-6981" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1160" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa EDS-G516E Vulnerability in using hard-coded credentials in series firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003311" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1160" } ], "trust": 0.6 } }