Vulnerabilites related to moxa - pt-7528-24tx-hv
CVE-2020-6995 (GCVE-0-2020-6995)
Vulnerability from cvelistv5
- CWE-521 - WEAK PASSWORD REQUIREMENTS
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
Version: Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:03.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower" } ] } ], "descriptions": [ { "lang": "en", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the application utilizes weak password requirements, which may allow an attacker to gain unauthorized access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-521", "description": "WEAK PASSWORD REQUIREMENTS CWE-521", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-24T19:16:16", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-6995", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower", "version": { "version_data": [ { "version_value": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the application utilizes weak password requirements, which may allow an attacker to gain unauthorized access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "WEAK PASSWORD REQUIREMENTS CWE-521" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-6995", "datePublished": "2020-03-24T19:16:16", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-08-04T09:18:03.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6987 (GCVE-0-2020-6987)
Vulnerability from cvelistv5
- CWE-327 - USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
Version: Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:02.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower" } ] } ], "descriptions": [ { "lang": "en", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-24T19:00:16", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-6987", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower", "version": { "version_data": [ { "version_value": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-6987", "datePublished": "2020-03-24T19:00:16", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-08-04T09:18:02.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6985 (GCVE-0-2020-6985)
Vulnerability from cvelistv5
- CWE-798 - USE OF HARD-CODED CREDENTIALS
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
Version: Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:02.996Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower" } ] } ], "descriptions": [ { "lang": "en", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, these devices use a hard-coded service code for access to the console." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "USE OF HARD-CODED CREDENTIALS CWE-798", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-24T19:11:40", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-6985", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower", "version": { "version_data": [ { "version_value": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, these devices use a hard-coded service code for access to the console." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE OF HARD-CODED CREDENTIALS CWE-798" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-6985", "datePublished": "2020-03-24T19:11:40", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-08-04T09:18:02.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6989 (GCVE-0-2020-6989)
Vulnerability from cvelistv5
- CWE-121 - STACK-BASED BUFFER OVERFLOW
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
Version: Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:02.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower" } ] } ], "descriptions": [ { "lang": "en", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-24T18:54:19", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-6989", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower", "version": { "version_data": [ { "version_value": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-6989", "datePublished": "2020-03-24T18:54:19", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-08-04T09:18:02.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6993 (GCVE-0-2020-6993)
Vulnerability from cvelistv5
- CWE-200 - INFORMATION EXPOSURE
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
Version: Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:02.970Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower" } ] } ], "descriptions": [ { "lang": "en", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "INFORMATION EXPOSURE CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-24T19:19:09", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-6993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower", "version": { "version_data": [ { "version_value": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "INFORMATION EXPOSURE CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-6993", "datePublished": "2020-03-24T19:19:09", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-08-04T09:18:02.970Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6983 (GCVE-0-2020-6983)
Vulnerability from cvelistv5
- CWE-321 - USE OF HARD-CODED CRYPTOGRAPHIC KEY
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
Version: Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:18:02.537Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower" } ] } ], "descriptions": [ { "lang": "en", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a hard-coded cryptographic key, which increases the possibility that confidential data can be recovered." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-321", "description": "USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-24T18:57:14", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-6983", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower", "version": { "version_data": [ { "version_value": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a hard-coded cryptographic key, which increases the possibility that confidential data can be recovered." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-6983", "datePublished": "2020-03-24T18:57:14", "dateReserved": "2020-01-14T00:00:00", "dateUpdated": "2024-08-04T09:18:02.537Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202003-1610
Vulnerability from variot
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa. Attackers can use this vulnerability to obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1610", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pt-7528-8mst-16tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8mst-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-wv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8mst-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-24-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8msc-16tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8msc-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20mst-4tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-20mst-4tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-f-24-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-20mst-4tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8msc-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8mst-16tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8ssc-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-16msc-8tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8msc-16tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-16msc-8tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16msc-8tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20mst-4tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16msc-8tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8ssc-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828 f-24", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 f-24-24", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 f-24-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 f-48", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 f-48-48", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=3.9" }, { "model": "pt-7528 series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=4.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8ssc 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8ssc 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp wv wv", "version": "*" } ], "sources": [ { "db": "IVD", "id": "9566e086-c3ef-4608-93be-35191c9dc622" }, { "db": "CNVD", "id": "CNVD-2020-13511" }, { "db": "JVNDB", "id": "JVNDB-2020-003323" }, { "db": "NVD", "id": "CVE-2020-6987" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-24_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-24-24_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-24-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-48_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-48-48_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003323" } ] }, "cve": "CVE-2020-6987", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-6987", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-003323", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-13511", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "9566e086-c3ef-4608-93be-35191c9dc622", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-6987", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003323", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6987", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-003323", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-13511", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202002-1190", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "9566e086-c3ef-4608-93be-35191c9dc622", "trust": 0.2, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-6987", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "9566e086-c3ef-4608-93be-35191c9dc622" }, { "db": "CNVD", "id": "CNVD-2020-13511" }, { "db": "VULMON", "id": "CVE-2020-6987" }, { "db": "JVNDB", "id": "JVNDB-2020-003323" }, { "db": "CNNVD", "id": "CNNVD-202002-1190" }, { "db": "NVD", "id": "CVE-2020-6987" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa. Attackers can use this vulnerability to obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2020-6987" }, { "db": "JVNDB", "id": "JVNDB-2020-003323" }, { "db": "CNVD", "id": "CNVD-2020-13511" }, { "db": "IVD", "id": "9566e086-c3ef-4608-93be-35191c9dc622" }, { "db": "VULMON", "id": "CVE-2020-6987" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6987", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-20-056-03", "trust": 3.1 }, { "db": "CNVD", "id": "CNVD-2020-13511", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-1190", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-003323", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.0725", "trust": 0.6 }, { "db": "IVD", "id": "9566E086-C3EF-4608-93BE-35191C9DC622", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2020-6987", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "9566e086-c3ef-4608-93be-35191c9dc622" }, { "db": "CNVD", "id": "CNVD-2020-13511" }, { "db": "VULMON", "id": "CVE-2020-6987" }, { "db": "JVNDB", "id": "JVNDB-2020-003323" }, { "db": "CNNVD", "id": "CNNVD-202002-1190" }, { "db": "NVD", "id": "CVE-2020-6987" } ] }, "id": "VAR-202003-1610", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "9566e086-c3ef-4608-93be-35191c9dc622" }, { "db": "CNVD", "id": "CNVD-2020-13511" } ], "trust": 1.5375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "9566e086-c3ef-4608-93be-35191c9dc622" }, { "db": "CNVD", "id": "CNVD-2020-13511" } ] }, "last_update_date": "2024-11-23T21:36:01.495000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.moxa.com/en/" }, { "title": "Patch for Moxa PT-7528 and PT-7828 Series Weak Password Algorithm Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/204851" }, { "title": "Moxa PT-7528 and PT-7828 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110384" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13511" }, { "db": "JVNDB", "id": "JVNDB-2020-003323" }, { "db": "CNNVD", "id": "CNNVD-202002-1190" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-327", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003323" }, { "db": "NVD", "id": "CVE-2020-6987" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6987" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6987" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0725/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/327.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13511" }, { "db": "VULMON", "id": "CVE-2020-6987" }, { "db": "JVNDB", "id": "JVNDB-2020-003323" }, { "db": "CNNVD", "id": "CNNVD-202002-1190" }, { "db": "NVD", "id": "CVE-2020-6987" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "9566e086-c3ef-4608-93be-35191c9dc622" }, { "db": "CNVD", "id": "CNVD-2020-13511" }, { "db": "VULMON", "id": "CVE-2020-6987" }, { "db": "JVNDB", "id": "JVNDB-2020-003323" }, { "db": "CNNVD", "id": "CNNVD-202002-1190" }, { "db": "NVD", "id": "CVE-2020-6987" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-25T00:00:00", "db": "IVD", "id": "9566e086-c3ef-4608-93be-35191c9dc622" }, { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13511" }, { "date": "2020-03-24T00:00:00", "db": "VULMON", "id": "CVE-2020-6987" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003323" }, { "date": "2020-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1190" }, { "date": "2020-03-24T19:15:21.337000", "db": "NVD", "id": "CVE-2020-6987" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13511" }, { "date": "2020-03-26T00:00:00", "db": "VULMON", "id": "CVE-2020-6987" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003323" }, { "date": "2020-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1190" }, { "date": "2024-11-21T05:36:26.417000", "db": "NVD", "id": "CVE-2020-6987" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1190" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa PT-7528 and PT-7828 Vulnerability in using cryptographic algorithms in series firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003323" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1190" } ], "trust": 0.6 } }
var-202003-1612
Vulnerability from variot
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code. Moxa PT-7528 and PT-7828 A series firmware contains a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa.
Moxa EDS-G516E and EDS-510E series have a buffer overflow vulnerability, which can be exploited by an attacker to cause a buffer overflow
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1612", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pt-7528-8mst-16tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8mst-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-wv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8mst-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-24-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8msc-16tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8msc-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20mst-4tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-20mst-4tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-f-24-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-20mst-4tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8msc-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8mst-16tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8ssc-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-16msc-8tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8msc-16tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-16msc-8tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16msc-8tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20mst-4tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16msc-8tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8ssc-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828 f-24", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 f-24-24", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 f-24-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 f-48", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 f-48-48", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "eds-510e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": "eds-g516e series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=5.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8ssc 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8ssc 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp wv wv", "version": "*" } ], "sources": [ { "db": "IVD", "id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b" }, { "db": "CNVD", "id": "CNVD-2020-13508" }, { "db": "JVNDB", "id": "JVNDB-2020-003324" }, { "db": "NVD", "id": "CVE-2020-6989" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-24_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-24-24_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-24-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-48_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-48-48_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003324" } ] }, "cve": "CVE-2020-6989", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-6989", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-003324", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-13508", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-6989", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003324", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6989", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-003324", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-13508", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202002-1174", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b", "trust": 0.2, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-6989", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b" }, { "db": "CNVD", "id": "CNVD-2020-13508" }, { "db": "VULMON", "id": "CVE-2020-6989" }, { "db": "JVNDB", "id": "JVNDB-2020-003324" }, { "db": "CNNVD", "id": "CNNVD-202002-1174" }, { "db": "NVD", "id": "CVE-2020-6989" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code. Moxa PT-7528 and PT-7828 A series firmware contains a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa. \n\r\n\r\nMoxa EDS-G516E and EDS-510E series have a buffer overflow vulnerability, which can be exploited by an attacker to cause a buffer overflow", "sources": [ { "db": "NVD", "id": "CVE-2020-6989" }, { "db": "JVNDB", "id": "JVNDB-2020-003324" }, { "db": "CNVD", "id": "CNVD-2020-13508" }, { "db": "IVD", "id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b" }, { "db": "VULMON", "id": "CVE-2020-6989" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6989", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-20-056-03", "trust": 2.5 }, { "db": "CNVD", "id": "CNVD-2020-13508", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-1174", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-003324", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-20-056-04", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0726", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47437", "trust": 0.6 }, { "db": "IVD", "id": "A9490CC0-BCF2-409D-BCB5-EDFE1E07190B", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2020-6989", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b" }, { "db": "CNVD", "id": "CNVD-2020-13508" }, { "db": "VULMON", "id": "CVE-2020-6989" }, { "db": "JVNDB", "id": "JVNDB-2020-003324" }, { "db": "CNNVD", "id": "CNNVD-202002-1174" }, { "db": "NVD", "id": "CVE-2020-6989" } ] }, "id": "VAR-202003-1612", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b" }, { "db": "CNVD", "id": "CNVD-2020-13508" } ], "trust": 1.5375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b" }, { "db": "CNVD", "id": "CNVD-2020-13508" } ] }, "last_update_date": "2024-11-23T21:36:01.726000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.moxa.com/en/" }, { "title": "Patch for Moxa EDS-G516E and EDS-510E series buffer overflow vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/204843" }, { "title": "Moxa PT-7528 and PT-7828 Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110371" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13508" }, { "db": "JVNDB", "id": "JVNDB-2020-003324" }, { "db": "CNNVD", "id": "CNNVD-202002-1174" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 }, { "problemtype": "CWE-121", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003324" }, { "db": "NVD", "id": "CVE-2020-6989" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6989" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6989" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0726/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47437" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/176778" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13508" }, { "db": "VULMON", "id": "CVE-2020-6989" }, { "db": "JVNDB", "id": "JVNDB-2020-003324" }, { "db": "CNNVD", "id": "CNNVD-202002-1174" }, { "db": "NVD", "id": "CVE-2020-6989" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b" }, { "db": "CNVD", "id": "CNVD-2020-13508" }, { "db": "VULMON", "id": "CVE-2020-6989" }, { "db": "JVNDB", "id": "JVNDB-2020-003324" }, { "db": "CNNVD", "id": "CNNVD-202002-1174" }, { "db": "NVD", "id": "CVE-2020-6989" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-25T00:00:00", "db": "IVD", "id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b" }, { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13508" }, { "date": "2020-03-24T00:00:00", "db": "VULMON", "id": "CVE-2020-6989" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003324" }, { "date": "2020-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1174" }, { "date": "2020-03-24T19:15:21.400000", "db": "NVD", "id": "CVE-2020-6989" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13508" }, { "date": "2020-03-26T00:00:00", "db": "VULMON", "id": "CVE-2020-6989" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003324" }, { "date": "2020-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1174" }, { "date": "2024-11-21T05:36:26.670000", "db": "NVD", "id": "CVE-2020-6989" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1174" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa PT-7528 and PT-7828 Out-of-bounds write vulnerabilities in series firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003324" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b" }, { "db": "CNNVD", "id": "CNNVD-202002-1174" } ], "trust": 0.8 } }
var-202003-1608
Vulnerability from variot
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, these devices use a hard-coded service code for access to the console. (DoS) It may be put into a state. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1608", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pt-7528-8mst-16tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8mst-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-wv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8mst-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-24-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8msc-16tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8msc-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20mst-4tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-20mst-4tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-f-24-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-20mst-4tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8msc-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8mst-16tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8ssc-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-16msc-8tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8msc-16tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-16msc-8tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16msc-8tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20mst-4tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16msc-8tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8ssc-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828 series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=3.9" }, { "model": "pt-7528 series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=4.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8ssc 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8ssc 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp wv wv", "version": "*" } ], "sources": [ { "db": "IVD", "id": "c2284339-03a2-4473-87f3-c396444ea32f" }, { "db": "CNVD", "id": "CNVD-2020-13513" }, { "db": "JVNDB", "id": "JVNDB-2020-003383" }, { "db": "NVD", "id": "CVE-2020-6985" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-wv_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003383" } ] }, "cve": "CVE-2020-6985", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2020-6985", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2020-003383", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-13513", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "c2284339-03a2-4473-87f3-c396444ea32f", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-6985", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003383", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6985", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-003383", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-13513", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202002-1171", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "c2284339-03a2-4473-87f3-c396444ea32f", "trust": 0.2, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-6985", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "c2284339-03a2-4473-87f3-c396444ea32f" }, { "db": "CNVD", "id": "CNVD-2020-13513" }, { "db": "VULMON", "id": "CVE-2020-6985" }, { "db": "JVNDB", "id": "JVNDB-2020-003383" }, { "db": "CNNVD", "id": "CNNVD-202002-1171" }, { "db": "NVD", "id": "CVE-2020-6985" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, these devices use a hard-coded service code for access to the console. (DoS) It may be put into a state. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa", "sources": [ { "db": "NVD", "id": "CVE-2020-6985" }, { "db": "JVNDB", "id": "JVNDB-2020-003383" }, { "db": "CNVD", "id": "CNVD-2020-13513" }, { "db": "IVD", "id": "c2284339-03a2-4473-87f3-c396444ea32f" }, { "db": "VULMON", "id": "CVE-2020-6985" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6985", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-20-056-03", "trust": 3.1 }, { "db": "CNVD", "id": "CNVD-2020-13513", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-1171", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-003383", "trust": 0.8 }, { "db": "NSFOCUS", "id": "47434", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0725", "trust": 0.6 }, { "db": "IVD", "id": "C2284339-03A2-4473-87F3-C396444EA32F", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2020-6985", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "c2284339-03a2-4473-87f3-c396444ea32f" }, { "db": "CNVD", "id": "CNVD-2020-13513" }, { "db": "VULMON", "id": "CVE-2020-6985" }, { "db": "JVNDB", "id": "JVNDB-2020-003383" }, { "db": "CNNVD", "id": "CNNVD-202002-1171" }, { "db": "NVD", "id": "CVE-2020-6985" } ] }, "id": "VAR-202003-1608", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "c2284339-03a2-4473-87f3-c396444ea32f" }, { "db": "CNVD", "id": "CNVD-2020-13513" } ], "trust": 1.5375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "c2284339-03a2-4473-87f3-c396444ea32f" }, { "db": "CNVD", "id": "CNVD-2020-13513" } ] }, "last_update_date": "2024-11-23T21:36:01.388000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.moxa.com/en/" }, { "title": "Patch for Moxa PT-7528 and PT-7828 Series Hard Credential Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/204855" }, { "title": "Moxa PT-7528 and PT-7828 Repair measures for trust management problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110369" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13513" }, { "db": "JVNDB", "id": "JVNDB-2020-003383" }, { "db": "CNNVD", "id": "CNNVD-202002-1171" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-798", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003383" }, { "db": "NVD", "id": "CVE-2020-6985" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6985" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6985" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47434" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0725/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/798.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13513" }, { "db": "VULMON", "id": "CVE-2020-6985" }, { "db": "JVNDB", "id": "JVNDB-2020-003383" }, { "db": "CNNVD", "id": "CNNVD-202002-1171" }, { "db": "NVD", "id": "CVE-2020-6985" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "c2284339-03a2-4473-87f3-c396444ea32f" }, { "db": "CNVD", "id": "CNVD-2020-13513" }, { "db": "VULMON", "id": "CVE-2020-6985" }, { "db": "JVNDB", "id": "JVNDB-2020-003383" }, { "db": "CNNVD", "id": "CNNVD-202002-1171" }, { "db": "NVD", "id": "CVE-2020-6985" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-25T00:00:00", "db": "IVD", "id": "c2284339-03a2-4473-87f3-c396444ea32f" }, { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13513" }, { "date": "2020-03-24T00:00:00", "db": "VULMON", "id": "CVE-2020-6985" }, { "date": "2020-04-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003383" }, { "date": "2020-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1171" }, { "date": "2020-03-24T20:15:14.943000", "db": "NVD", "id": "CVE-2020-6985" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-02T00:00:00", "db": "CNVD", "id": "CNVD-2020-13513" }, { "date": "2020-03-26T00:00:00", "db": "VULMON", "id": "CVE-2020-6985" }, { "date": "2020-04-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003383" }, { "date": "2020-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1171" }, { "date": "2024-11-21T05:36:26.153000", "db": "NVD", "id": "CVE-2020-6985" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1171" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa PT-7528 and PT-7828 Vulnerability in using hard-coded credentials in series firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003383" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1171" } ], "trust": 0.6 } }
var-202003-1666
Vulnerability from variot
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the application utilizes weak password requirements, which may allow an attacker to gain unauthorized access. Moxa PT-7528 and PT-7828 The series firmware contains a vulnerability related to the request for a weak password.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1666", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pt-7528-8mst-16tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8mst-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-wv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8mst-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-24-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8msc-16tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8msc-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20mst-4tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-20mst-4tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-f-24-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-20mst-4tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8msc-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8mst-16tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8ssc-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-16msc-8tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8msc-16tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-16msc-8tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16msc-8tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20mst-4tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16msc-8tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8ssc-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828 series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=3.9" }, { "model": "pt-7528 series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=4.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8ssc 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8ssc 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp wv wv", "version": "*" } ], "sources": [ { "db": "IVD", "id": "0c731115-513e-49b7-8112-8834cb2de285" }, { "db": "CNVD", "id": "CNVD-2020-13514" }, { "db": "JVNDB", "id": "JVNDB-2020-003385" }, { "db": "NVD", "id": "CVE-2020-6995" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-wv_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003385" } ] }, "cve": "CVE-2020-6995", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-6995", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-003385", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-13514", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "0c731115-513e-49b7-8112-8834cb2de285", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-6995", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003385", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6995", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-003385", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-13514", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202002-1167", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "0c731115-513e-49b7-8112-8834cb2de285", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "0c731115-513e-49b7-8112-8834cb2de285" }, { "db": "CNVD", "id": "CNVD-2020-13514" }, { "db": "JVNDB", "id": "JVNDB-2020-003385" }, { "db": "CNNVD", "id": "CNNVD-202002-1167" }, { "db": "NVD", "id": "CVE-2020-6995" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the application utilizes weak password requirements, which may allow an attacker to gain unauthorized access. Moxa PT-7528 and PT-7828 The series firmware contains a vulnerability related to the request for a weak password.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa", "sources": [ { "db": "NVD", "id": "CVE-2020-6995" }, { "db": "JVNDB", "id": "JVNDB-2020-003385" }, { "db": "CNVD", "id": "CNVD-2020-13514" }, { "db": "IVD", "id": "0c731115-513e-49b7-8112-8834cb2de285" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6995", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-056-03", "trust": 3.0 }, { "db": "CNVD", "id": "CNVD-2020-13514", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-1167", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-003385", "trust": 0.8 }, { "db": "NSFOCUS", "id": "47427", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0725", "trust": 0.6 }, { "db": "IVD", "id": "0C731115-513E-49B7-8112-8834CB2DE285", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "0c731115-513e-49b7-8112-8834cb2de285" }, { "db": "CNVD", "id": "CNVD-2020-13514" }, { "db": "JVNDB", "id": "JVNDB-2020-003385" }, { "db": "CNNVD", "id": "CNNVD-202002-1167" }, { "db": "NVD", "id": "CVE-2020-6995" } ] }, "id": "VAR-202003-1666", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "0c731115-513e-49b7-8112-8834cb2de285" }, { "db": "CNVD", "id": "CNVD-2020-13514" } ], "trust": 1.5375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "0c731115-513e-49b7-8112-8834cb2de285" }, { "db": "CNVD", "id": "CNVD-2020-13514" } ] }, "last_update_date": "2024-11-23T21:36:01.690000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.moxa.com/en/" }, { "title": "Patch for Moxa PT-7528 and PT-7828 Series Weak Password Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/204857" }, { "title": "Moxa PT-7528 and PT-7828 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110366" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13514" }, { "db": "JVNDB", "id": "JVNDB-2020-003385" }, { "db": "CNNVD", "id": "CNNVD-202002-1167" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-521", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003385" }, { "db": "NVD", "id": "CVE-2020-6995" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6995" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6995" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47427" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0725/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13514" }, { "db": "JVNDB", "id": "JVNDB-2020-003385" }, { "db": "CNNVD", "id": "CNNVD-202002-1167" }, { "db": "NVD", "id": "CVE-2020-6995" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "0c731115-513e-49b7-8112-8834cb2de285" }, { "db": "CNVD", "id": "CNVD-2020-13514" }, { "db": "JVNDB", "id": "JVNDB-2020-003385" }, { "db": "CNNVD", "id": "CNNVD-202002-1167" }, { "db": "NVD", "id": "CVE-2020-6995" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-25T00:00:00", "db": "IVD", "id": "0c731115-513e-49b7-8112-8834cb2de285" }, { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13514" }, { "date": "2020-04-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003385" }, { "date": "2020-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1167" }, { "date": "2020-03-24T20:15:15.100000", "db": "NVD", "id": "CVE-2020-6995" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13514" }, { "date": "2020-04-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003385" }, { "date": "2020-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1167" }, { "date": "2024-11-21T05:36:27.387000", "db": "NVD", "id": "CVE-2020-6995" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1167" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa PT-7528 and PT-7828 Vulnerability in requesting weak passwords in series firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003385" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "IVD", "id": "0c731115-513e-49b7-8112-8834cb2de285" }, { "db": "CNNVD", "id": "CNNVD-202002-1167" } ], "trust": 0.8 } }
var-202003-1601
Vulnerability from variot
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a hard-coded cryptographic key, which increases the possibility that confidential data can be recovered. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1601", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pt-7528-8mst-16tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8mst-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-wv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8mst-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-24-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8msc-16tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8msc-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20mst-4tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-20mst-4tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-f-24-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-20mst-4tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8msc-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8mst-16tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8ssc-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-16msc-8tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8msc-16tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-16msc-8tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16msc-8tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20mst-4tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16msc-8tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8ssc-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828 f-24", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 f-24-24", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 f-24-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 f-48", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 f-48-48", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828 series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=3.9" }, { "model": "pt-7528 series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=4.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8ssc 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8ssc 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp wv wv", "version": "*" } ], "sources": [ { "db": "IVD", "id": "eba56277-eeb7-4731-9c4d-337185d89917" }, { "db": "CNVD", "id": "CNVD-2020-13512" }, { "db": "JVNDB", "id": "JVNDB-2020-003322" }, { "db": "NVD", "id": "CVE-2020-6983" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-24_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-24-24_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-24-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-48_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7828-f-48-48_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003322" } ] }, "cve": "CVE-2020-6983", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-6983", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-003322", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-13512", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "eba56277-eeb7-4731-9c4d-337185d89917", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-6983", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003322", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6983", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-003322", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-13512", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202002-1176", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "eba56277-eeb7-4731-9c4d-337185d89917", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "eba56277-eeb7-4731-9c4d-337185d89917" }, { "db": "CNVD", "id": "CNVD-2020-13512" }, { "db": "JVNDB", "id": "JVNDB-2020-003322" }, { "db": "CNNVD", "id": "CNNVD-202002-1176" }, { "db": "NVD", "id": "CVE-2020-6983" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a hard-coded cryptographic key, which increases the possibility that confidential data can be recovered. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa", "sources": [ { "db": "NVD", "id": "CVE-2020-6983" }, { "db": "JVNDB", "id": "JVNDB-2020-003322" }, { "db": "CNVD", "id": "CNVD-2020-13512" }, { "db": "IVD", "id": "eba56277-eeb7-4731-9c4d-337185d89917" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6983", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-056-03", "trust": 3.0 }, { "db": "CNVD", "id": "CNVD-2020-13512", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-1176", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-003322", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.0725", "trust": 0.6 }, { "db": "IVD", "id": "EBA56277-EEB7-4731-9C4D-337185D89917", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "eba56277-eeb7-4731-9c4d-337185d89917" }, { "db": "CNVD", "id": "CNVD-2020-13512" }, { "db": "JVNDB", "id": "JVNDB-2020-003322" }, { "db": "CNNVD", "id": "CNNVD-202002-1176" }, { "db": "NVD", "id": "CVE-2020-6983" } ] }, "id": "VAR-202003-1601", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "eba56277-eeb7-4731-9c4d-337185d89917" }, { "db": "CNVD", "id": "CNVD-2020-13512" } ], "trust": 1.5375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "eba56277-eeb7-4731-9c4d-337185d89917" }, { "db": "CNVD", "id": "CNVD-2020-13512" } ] }, "last_update_date": "2024-11-23T21:36:01.593000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.moxa.com/en/" }, { "title": "Patch for Moxa PT-7528 and PT-7828 Series Hardcoded Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/204853" }, { "title": "Moxa PT-7528 and PT-7828 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110372" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13512" }, { "db": "JVNDB", "id": "JVNDB-2020-003322" }, { "db": "CNNVD", "id": "CNNVD-202002-1176" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-798", "trust": 1.8 }, { "problemtype": "CWE-321", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003322" }, { "db": "NVD", "id": "CVE-2020-6983" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6983" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6983" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0725/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13512" }, { "db": "JVNDB", "id": "JVNDB-2020-003322" }, { "db": "CNNVD", "id": "CNNVD-202002-1176" }, { "db": "NVD", "id": "CVE-2020-6983" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "eba56277-eeb7-4731-9c4d-337185d89917" }, { "db": "CNVD", "id": "CNVD-2020-13512" }, { "db": "JVNDB", "id": "JVNDB-2020-003322" }, { "db": "CNNVD", "id": "CNNVD-202002-1176" }, { "db": "NVD", "id": "CVE-2020-6983" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-25T00:00:00", "db": "IVD", "id": "eba56277-eeb7-4731-9c4d-337185d89917" }, { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13512" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003322" }, { "date": "2020-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1176" }, { "date": "2020-03-24T19:15:21.257000", "db": "NVD", "id": "CVE-2020-6983" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13512" }, { "date": "2020-04-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003322" }, { "date": "2020-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1176" }, { "date": "2024-11-21T05:36:25.897000", "db": "NVD", "id": "CVE-2020-6983" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1176" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa PT-7528 and PT-7828 Vulnerability in using hard-coded credentials in series firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003322" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1176" } ], "trust": 0.6 } }
var-202003-1665
Vulnerability from variot
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa. Attackers can use this vulnerability to obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1665", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pt-7528-8mst-16tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8mst-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-wv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8mst-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-24tx-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-24-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8msc-16tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8msc-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20mst-4tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-20mst-4tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-f-24-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-20mst-4tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8msc-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16mst-8tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8mst-16tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-8ssc-16tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-16msc-8tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8msc-16tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24-24", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-16msc-8tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16msc-8tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20mst-4tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-16msc-8tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-f-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7828-r-48", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-8ssc-16tx-4gsfp-wv-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-20msc-4tx-4gsfp-wv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828-r-24-hv", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.9" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-hv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12msc-12tx-4gsfp-wv-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-12mst-12tx-4gsfp-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-hv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv-hv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7528-24tx-wv-wv", "scope": "eq", "trust": 0.8, "vendor": "moxa", "version": "4.0" }, { "model": "pt-7828 series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=3.9" }, { "model": "pt-7528 series", "scope": "lte", "trust": 0.6, "vendor": "moxa", "version": "\u003c=4.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12mst 12tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16msc 8tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 16mst 8tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20msc 4tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 20mst 4tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8msc 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8mst 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8ssc 16tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 8ssc 16tx 4gsfp wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 24 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f 48 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 f hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24 24", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 24tx wv wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 24 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48 48", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r 48 hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7828 r hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp hv hv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp wv", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pt 7528 12msc 12tx 4gsfp wv wv", "version": "*" } ], "sources": [ { "db": "IVD", "id": "d3266e45-a69a-4140-ae05-e8339f6a6691" }, { "db": "CNVD", "id": "CNVD-2020-13507" }, { "db": "JVNDB", "id": "JVNDB-2020-003384" }, { "db": "NVD", "id": "CVE-2020-6993" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-hv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-wv_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003384" } ] }, "cve": "CVE-2020-6993", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-6993", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-003384", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-13507", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "d3266e45-a69a-4140-ae05-e8339f6a6691", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-6993", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003384", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-6993", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-003384", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-13507", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202002-1164", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "d3266e45-a69a-4140-ae05-e8339f6a6691", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "d3266e45-a69a-4140-ae05-e8339f6a6691" }, { "db": "CNVD", "id": "CNVD-2020-13507" }, { "db": "JVNDB", "id": "JVNDB-2020-003384" }, { "db": "CNNVD", "id": "CNNVD-202002-1164" }, { "db": "NVD", "id": "CVE-2020-6993" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa. Attackers can use this vulnerability to obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2020-6993" }, { "db": "JVNDB", "id": "JVNDB-2020-003384" }, { "db": "CNVD", "id": "CNVD-2020-13507" }, { "db": "IVD", "id": "d3266e45-a69a-4140-ae05-e8339f6a6691" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-6993", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-056-03", "trust": 3.0 }, { "db": "CNVD", "id": "CNVD-2020-13507", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-1164", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-003384", "trust": 0.8 }, { "db": "NSFOCUS", "id": "47431", "trust": 0.6 }, { "db": "NSFOCUS", "id": "47492", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0725", "trust": 0.6 }, { "db": "IVD", "id": "D3266E45-A69A-4140-AE05-E8339F6A6691", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "d3266e45-a69a-4140-ae05-e8339f6a6691" }, { "db": "CNVD", "id": "CNVD-2020-13507" }, { "db": "JVNDB", "id": "JVNDB-2020-003384" }, { "db": "CNNVD", "id": "CNNVD-202002-1164" }, { "db": "NVD", "id": "CVE-2020-6993" } ] }, "id": "VAR-202003-1665", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "d3266e45-a69a-4140-ae05-e8339f6a6691" }, { "db": "CNVD", "id": "CNVD-2020-13507" } ], "trust": 1.5375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "d3266e45-a69a-4140-ae05-e8339f6a6691" }, { "db": "CNVD", "id": "CNVD-2020-13507" } ] }, "last_update_date": "2024-11-23T21:36:01.354000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.moxa.com/en/" }, { "title": "Patch for Moxa PT-7528 and PT-7828 Series Information Disclosure Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/204859" }, { "title": "Moxa PT-7528 and PT-7828 Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110364" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13507" }, { "db": "JVNDB", "id": "JVNDB-2020-003384" }, { "db": "CNNVD", "id": "CNNVD-202002-1164" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003384" }, { "db": "NVD", "id": "CVE-2020-6993" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6993" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6993" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47492" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0725/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47431" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-13507" }, { "db": "JVNDB", "id": "JVNDB-2020-003384" }, { "db": "CNNVD", "id": "CNNVD-202002-1164" }, { "db": "NVD", "id": "CVE-2020-6993" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "d3266e45-a69a-4140-ae05-e8339f6a6691" }, { "db": "CNVD", "id": "CNVD-2020-13507" }, { "db": "JVNDB", "id": "JVNDB-2020-003384" }, { "db": "CNNVD", "id": "CNNVD-202002-1164" }, { "db": "NVD", "id": "CVE-2020-6993" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-25T00:00:00", "db": "IVD", "id": "d3266e45-a69a-4140-ae05-e8339f6a6691" }, { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13507" }, { "date": "2020-04-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003384" }, { "date": "2020-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1164" }, { "date": "2020-03-24T20:15:15.023000", "db": "NVD", "id": "CVE-2020-6993" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-26T00:00:00", "db": "CNVD", "id": "CNVD-2020-13507" }, { "date": "2020-04-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003384" }, { "date": "2020-08-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-1164" }, { "date": "2024-11-21T05:36:27.113000", "db": "NVD", "id": "CVE-2020-6993" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1164" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moxa PT-7528 and PT-7828 Information leakage vulnerability in series firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003384" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-1164" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23172D9F-8C29-436C-8D1D-C6C69A7D544B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8DA48C-AC0C-4134-96E5-58D1DE15E83F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87870519-31E2-438F-9E4B-80C1E960BAA6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4161EA3-F10A-4311-9C91-A19CFD97B6E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9662C706-550D-4A2A-B811-46FC67D4ECD8", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB152B69-992F-4C89-A5C5-00F67E19BC9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E2ECB8C-6E44-4884-A543-92B3FADBF913", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "941BB098-D358-4F8C-BCD6-0AE9E1F9B515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8350B35C-F6AD-49ED-B165-A318EFCF9057", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5B4B95C-7D87-4F5A-9499-97FBA99A93FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "598CFEF6-EDE3-4446-BF7B-459E2AC51D43", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CFBC387-D664-4789-B3F7-7B87667963EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4B85577-5789-49D4-8F55-E9674BFAADE8", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C532A7-AFC5-4F8B-9FCA-365DE8CAAD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20CF217C-21DD-4181-9489-B59168E48B69", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "310FA2C6-C219-4C22-BABD-8CD3B4DBA20A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E30F784-5FC1-4F9B-8E87-939028052B9F", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B10C85C-B21A-427F-B8DA-5D7EB00382F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAF33C5F-51BA-433F-96F5-C56DA78DA78E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB085777-7FC8-4FC5-869C-9DF351B16799", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A1D658-9F40-4D0D-A243-EF91342224DA", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAEA10F5-9E52-4658-851A-7ABDD4135E90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B21B040-6F79-4845-8A57-51361637401D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B5BB02-8C2F-4E98-BB60-E5F261681C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63B66690-697D-4DD0-A7FF-83185174E8EC", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AA88D4-4BCF-43C4-BDD3-2F8C8E596046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBF1C1B-3DA2-4EE4-A36B-83C5B84232E6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0414660-74EF-49F0-9DBA-0305B835D408", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46683121-C8D6-40C9-86F0-A3F44977BD71", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF4DD3C6-78B5-4458-B487-63D37027CF99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CF72041-8378-497F-86EF-E7AE3B7A855C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "62C16033-43B1-41C0-87E7-4ABEB1EA6761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76DF7328-037B-4D75-BFF1-D22FE32D1F9D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "674D3631-53DF-4E98-BC1E-C4122DF3F26A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A376430A-4F8E-4B91-83E4-C9D14A601C2E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB472079-8ECF-44E2-969E-4FB5CF0E3971", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "055969EC-1F60-4F95-B686-535A71F5F496", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A7A8554-54A1-4B4C-A583-90FC0EC49A11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "379BD1B2-68D5-4BB2-A816-DCB69183267D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "95E4FE31-0EC0-4034-8099-BCEC33E421ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A249EAAC-7B5C-4ADA-A5D1-E612D2F580F2", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6431F64E-9899-4F01-8814-1A92A36353C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41C54026-899E-4D3C-8ECD-B9D1C6751B26", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "D937271E-9E14-446A-B5DD-7B1E6D2B5C9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0783C349-5E13-4B8E-BE92-DFB18DE31643", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE86A9B-1C3F-4208-A238-3E70031D3856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "567BC006-28FB-44F2-A779-B4B8320F3A3B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9E901-A046-4CC2-A3E5-42E42EA3308C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C377E2E-43F1-4CDA-9386-074374EFD71C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABF64C98-AF29-4C56-9E21-081E5DBE0B79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83852BAA-F68C-4273-B822-25280EBE3D00", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F676041D-CF87-403D-9911-5B6DA9B21CC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B07BFA5-350C-401A-B063-B0322157784C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECF8194D-BAA0-4F1F-AAC3-C5B96E4D0368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E2DDC4-5EEE-459D-AAB4-18AC1573C5F6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2C73920-8D86-4511-981D-944AD53965D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F8503F5-454C-4EB9-86DC-853CB7D3BF9C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "65AAE0BE-B955-428C-8DB3-EDC69D513B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86246FAC-8D36-41FE-85EC-9362D938A85B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCFD34-9E11-4F33-AE7B-4F20F7B3A1C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F63B515-D60A-41C8-AD93-DBCE2440E6AD", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F36333F5-C4F5-4BB2-940C-88D9F886D398", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F703C1A8-E64A-4486-9F1A-11D0FF4EC5CE", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEA388CA-199C-487F-82F0-752FFA204286", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E7BA6AA-9EE5-46A8-AC4C-466A87159D95", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "145A2735-5820-4060-80A0-51F3D7CABCCE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB462B54-F23B-4939-B9DF-2DFDE242C322", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8E6D37D-CD68-4E62-97BA-B6E87565C04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2896256B-54D6-45EC-9F23-9D27ABD04FBD", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "64A930B4-B043-4AF9-95E4-562AB65A9CDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86638803-6014-4DE7-BBC9-26F2137368FF", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B29B0F1-0575-4EFF-9A45-6E86526A2C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C202168C-3666-4726-93A4-8AA0F910B322", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6711A4E5-F1D8-4C4E-BD2A-52FB66F670F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B0F7D65-7F08-4AFA-A30A-E29DCDFD49A7", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "75ADE518-83D1-4275-8E55-5412238EFC86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DD1476B-B648-4EB7-A233-75FFDC4FCF1E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "C689B536-4889-4BA1-AB29-ACE7C5DC952D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FADBEE27-6C34-4F1C-B1FF-FC90263D3CB8", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C91F7180-8FC6-4A74-B59E-D11E9AC529A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "748065CA-4349-48DC-96D9-0FB05F3BF098", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "69EEDC14-3565-4808-9EC5-F27B201D48B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E768FF9-FAEB-44D1-95E5-8A416C934371", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEADBFB7-64EB-4E1B-86DB-364E2F0111D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C480A-5367-46C1-85A5-E3210E0C670A", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "17BF3C14-D5BE-4369-867E-7DEE972FEC97", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749457D9-5269-43C3-A6A2-F1DF27D87F1A", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ABB933B-A0CB-431E-A51D-EB630BFE92D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9A526F2-8568-4088-87AF-B63D5063594B", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "29F68ADA-AE16-4FFC-9374-2AFFBCCFBF57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3695DC89-A027-49A6-A39E-77BDAE7A424E", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F572FA7-7520-4F5F-8398-42B3788C8B8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD226E1F-DAE6-47B5-B5F3-46FAE2B7C2FD", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9B389AF-83A2-4A35-96BE-7971B1B3E4FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "238EAECC-E3A2-426B-9A5A-9F48D985B322", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "08EF9BFC-B45B-4F5E-8745-B335EFE638A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A07EA3C4-2722-43B4-9AD7-EFCD92BDCED8", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F88B615C-BE6A-4B1C-95A7-5B37796159C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5058559A-1141-4B2C-AD06-58DD3E590C56", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D507239-F351-4DA0-80D0-96ACB9419EC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9018404B-910F-4247-AB18-CA644A052FEE", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "91198EE7-4205-478E-B7A8-987F977AD82C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "189D5ACC-D0F2-428B-A90C-2FA39D6D6C20", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DA7C0A-2F37-461D-AFA8-BF73C653F47E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41D304A9-E038-44F4-A139-896A51DB25A5", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EA7D60F-4670-4AAE-8A31-89C60A38EA43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33B8C349-4B07-4172-A629-4C0FBDE943A2", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "392DB5FC-65AA-4E08-8E9F-AA66F6135078", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8F1E348-4C0F-420B-9275-2D5257D6E8BA", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC4F8DC4-26C0-4D82-A7B6-8285158A1F21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, these devices use a hard-coded service code for access to the console." }, { "lang": "es", "value": "En Moxa la serie PT-7528 firmware, versi\u00f3n 4.0 o inferior, y la serie PT-7828 firmware, versi\u00f3n 3.9 o inferior, estos dispositivos usan un c\u00f3digo de servicio embebido para acceder a la consola." } ], "id": "CVE-2020-6985", "lastModified": "2024-11-21T05:36:26.153", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-24T20:15:14.943", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23172D9F-8C29-436C-8D1D-C6C69A7D544B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8DA48C-AC0C-4134-96E5-58D1DE15E83F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87870519-31E2-438F-9E4B-80C1E960BAA6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4161EA3-F10A-4311-9C91-A19CFD97B6E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9662C706-550D-4A2A-B811-46FC67D4ECD8", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB152B69-992F-4C89-A5C5-00F67E19BC9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E2ECB8C-6E44-4884-A543-92B3FADBF913", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "941BB098-D358-4F8C-BCD6-0AE9E1F9B515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8350B35C-F6AD-49ED-B165-A318EFCF9057", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5B4B95C-7D87-4F5A-9499-97FBA99A93FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "598CFEF6-EDE3-4446-BF7B-459E2AC51D43", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CFBC387-D664-4789-B3F7-7B87667963EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4B85577-5789-49D4-8F55-E9674BFAADE8", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C532A7-AFC5-4F8B-9FCA-365DE8CAAD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20CF217C-21DD-4181-9489-B59168E48B69", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "310FA2C6-C219-4C22-BABD-8CD3B4DBA20A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E30F784-5FC1-4F9B-8E87-939028052B9F", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B10C85C-B21A-427F-B8DA-5D7EB00382F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAF33C5F-51BA-433F-96F5-C56DA78DA78E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB085777-7FC8-4FC5-869C-9DF351B16799", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A1D658-9F40-4D0D-A243-EF91342224DA", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAEA10F5-9E52-4658-851A-7ABDD4135E90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B21B040-6F79-4845-8A57-51361637401D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B5BB02-8C2F-4E98-BB60-E5F261681C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63B66690-697D-4DD0-A7FF-83185174E8EC", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AA88D4-4BCF-43C4-BDD3-2F8C8E596046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBF1C1B-3DA2-4EE4-A36B-83C5B84232E6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0414660-74EF-49F0-9DBA-0305B835D408", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46683121-C8D6-40C9-86F0-A3F44977BD71", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF4DD3C6-78B5-4458-B487-63D37027CF99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CF72041-8378-497F-86EF-E7AE3B7A855C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "62C16033-43B1-41C0-87E7-4ABEB1EA6761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76DF7328-037B-4D75-BFF1-D22FE32D1F9D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "674D3631-53DF-4E98-BC1E-C4122DF3F26A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A376430A-4F8E-4B91-83E4-C9D14A601C2E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB472079-8ECF-44E2-969E-4FB5CF0E3971", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "055969EC-1F60-4F95-B686-535A71F5F496", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A7A8554-54A1-4B4C-A583-90FC0EC49A11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "379BD1B2-68D5-4BB2-A816-DCB69183267D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "95E4FE31-0EC0-4034-8099-BCEC33E421ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A249EAAC-7B5C-4ADA-A5D1-E612D2F580F2", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6431F64E-9899-4F01-8814-1A92A36353C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41C54026-899E-4D3C-8ECD-B9D1C6751B26", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "D937271E-9E14-446A-B5DD-7B1E6D2B5C9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0783C349-5E13-4B8E-BE92-DFB18DE31643", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE86A9B-1C3F-4208-A238-3E70031D3856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "567BC006-28FB-44F2-A779-B4B8320F3A3B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9E901-A046-4CC2-A3E5-42E42EA3308C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C377E2E-43F1-4CDA-9386-074374EFD71C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABF64C98-AF29-4C56-9E21-081E5DBE0B79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83852BAA-F68C-4273-B822-25280EBE3D00", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F676041D-CF87-403D-9911-5B6DA9B21CC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B07BFA5-350C-401A-B063-B0322157784C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECF8194D-BAA0-4F1F-AAC3-C5B96E4D0368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E2DDC4-5EEE-459D-AAB4-18AC1573C5F6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2C73920-8D86-4511-981D-944AD53965D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F8503F5-454C-4EB9-86DC-853CB7D3BF9C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "65AAE0BE-B955-428C-8DB3-EDC69D513B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86246FAC-8D36-41FE-85EC-9362D938A85B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCFD34-9E11-4F33-AE7B-4F20F7B3A1C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F63B515-D60A-41C8-AD93-DBCE2440E6AD", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F36333F5-C4F5-4BB2-940C-88D9F886D398", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F703C1A8-E64A-4486-9F1A-11D0FF4EC5CE", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEA388CA-199C-487F-82F0-752FFA204286", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E7BA6AA-9EE5-46A8-AC4C-466A87159D95", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "145A2735-5820-4060-80A0-51F3D7CABCCE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB462B54-F23B-4939-B9DF-2DFDE242C322", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8E6D37D-CD68-4E62-97BA-B6E87565C04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2896256B-54D6-45EC-9F23-9D27ABD04FBD", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "64A930B4-B043-4AF9-95E4-562AB65A9CDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86638803-6014-4DE7-BBC9-26F2137368FF", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B29B0F1-0575-4EFF-9A45-6E86526A2C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C202168C-3666-4726-93A4-8AA0F910B322", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6711A4E5-F1D8-4C4E-BD2A-52FB66F670F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B0F7D65-7F08-4AFA-A30A-E29DCDFD49A7", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "75ADE518-83D1-4275-8E55-5412238EFC86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DD1476B-B648-4EB7-A233-75FFDC4FCF1E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "C689B536-4889-4BA1-AB29-ACE7C5DC952D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FADBEE27-6C34-4F1C-B1FF-FC90263D3CB8", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C91F7180-8FC6-4A74-B59E-D11E9AC529A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "748065CA-4349-48DC-96D9-0FB05F3BF098", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "69EEDC14-3565-4808-9EC5-F27B201D48B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E768FF9-FAEB-44D1-95E5-8A416C934371", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEADBFB7-64EB-4E1B-86DB-364E2F0111D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C480A-5367-46C1-85A5-E3210E0C670A", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "17BF3C14-D5BE-4369-867E-7DEE972FEC97", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749457D9-5269-43C3-A6A2-F1DF27D87F1A", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ABB933B-A0CB-431E-A51D-EB630BFE92D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9A526F2-8568-4088-87AF-B63D5063594B", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "29F68ADA-AE16-4FFC-9374-2AFFBCCFBF57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3695DC89-A027-49A6-A39E-77BDAE7A424E", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F572FA7-7520-4F5F-8398-42B3788C8B8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD226E1F-DAE6-47B5-B5F3-46FAE2B7C2FD", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9B389AF-83A2-4A35-96BE-7971B1B3E4FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "238EAECC-E3A2-426B-9A5A-9F48D985B322", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "08EF9BFC-B45B-4F5E-8745-B335EFE638A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A07EA3C4-2722-43B4-9AD7-EFCD92BDCED8", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F88B615C-BE6A-4B1C-95A7-5B37796159C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5058559A-1141-4B2C-AD06-58DD3E590C56", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D507239-F351-4DA0-80D0-96ACB9419EC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9018404B-910F-4247-AB18-CA644A052FEE", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "91198EE7-4205-478E-B7A8-987F977AD82C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "189D5ACC-D0F2-428B-A90C-2FA39D6D6C20", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DA7C0A-2F37-461D-AFA8-BF73C653F47E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41D304A9-E038-44F4-A139-896A51DB25A5", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EA7D60F-4670-4AAE-8A31-89C60A38EA43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33B8C349-4B07-4172-A629-4C0FBDE943A2", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "392DB5FC-65AA-4E08-8E9F-AA66F6135078", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8F1E348-4C0F-420B-9275-2D5257D6E8BA", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC4F8DC4-26C0-4D82-A7B6-8285158A1F21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization." }, { "lang": "es", "value": "En Moxa la serie PT-7528 firmware, versi\u00f3n 4.0 o inferior, y la serie PT-7828 firmware, versi\u00f3n 3.9 o inferior, un atacante puede conseguir acceso a informaci\u00f3n confidencial del servicio web sin autorizaci\u00f3n." } ], "id": "CVE-2020-6993", "lastModified": "2024-11-21T05:36:27.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-24T20:15:15.023", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23172D9F-8C29-436C-8D1D-C6C69A7D544B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8DA48C-AC0C-4134-96E5-58D1DE15E83F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87870519-31E2-438F-9E4B-80C1E960BAA6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4161EA3-F10A-4311-9C91-A19CFD97B6E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9662C706-550D-4A2A-B811-46FC67D4ECD8", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB152B69-992F-4C89-A5C5-00F67E19BC9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E2ECB8C-6E44-4884-A543-92B3FADBF913", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "941BB098-D358-4F8C-BCD6-0AE9E1F9B515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8350B35C-F6AD-49ED-B165-A318EFCF9057", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5B4B95C-7D87-4F5A-9499-97FBA99A93FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "598CFEF6-EDE3-4446-BF7B-459E2AC51D43", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CFBC387-D664-4789-B3F7-7B87667963EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4B85577-5789-49D4-8F55-E9674BFAADE8", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C532A7-AFC5-4F8B-9FCA-365DE8CAAD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20CF217C-21DD-4181-9489-B59168E48B69", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "310FA2C6-C219-4C22-BABD-8CD3B4DBA20A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E30F784-5FC1-4F9B-8E87-939028052B9F", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B10C85C-B21A-427F-B8DA-5D7EB00382F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAF33C5F-51BA-433F-96F5-C56DA78DA78E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB085777-7FC8-4FC5-869C-9DF351B16799", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A1D658-9F40-4D0D-A243-EF91342224DA", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAEA10F5-9E52-4658-851A-7ABDD4135E90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B21B040-6F79-4845-8A57-51361637401D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B5BB02-8C2F-4E98-BB60-E5F261681C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63B66690-697D-4DD0-A7FF-83185174E8EC", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AA88D4-4BCF-43C4-BDD3-2F8C8E596046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBF1C1B-3DA2-4EE4-A36B-83C5B84232E6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0414660-74EF-49F0-9DBA-0305B835D408", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46683121-C8D6-40C9-86F0-A3F44977BD71", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF4DD3C6-78B5-4458-B487-63D37027CF99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CF72041-8378-497F-86EF-E7AE3B7A855C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "62C16033-43B1-41C0-87E7-4ABEB1EA6761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76DF7328-037B-4D75-BFF1-D22FE32D1F9D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "674D3631-53DF-4E98-BC1E-C4122DF3F26A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A376430A-4F8E-4B91-83E4-C9D14A601C2E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB472079-8ECF-44E2-969E-4FB5CF0E3971", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "055969EC-1F60-4F95-B686-535A71F5F496", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A7A8554-54A1-4B4C-A583-90FC0EC49A11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "379BD1B2-68D5-4BB2-A816-DCB69183267D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "95E4FE31-0EC0-4034-8099-BCEC33E421ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A249EAAC-7B5C-4ADA-A5D1-E612D2F580F2", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6431F64E-9899-4F01-8814-1A92A36353C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41C54026-899E-4D3C-8ECD-B9D1C6751B26", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "D937271E-9E14-446A-B5DD-7B1E6D2B5C9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0783C349-5E13-4B8E-BE92-DFB18DE31643", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE86A9B-1C3F-4208-A238-3E70031D3856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "567BC006-28FB-44F2-A779-B4B8320F3A3B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9E901-A046-4CC2-A3E5-42E42EA3308C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C377E2E-43F1-4CDA-9386-074374EFD71C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABF64C98-AF29-4C56-9E21-081E5DBE0B79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83852BAA-F68C-4273-B822-25280EBE3D00", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F676041D-CF87-403D-9911-5B6DA9B21CC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B07BFA5-350C-401A-B063-B0322157784C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECF8194D-BAA0-4F1F-AAC3-C5B96E4D0368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E2DDC4-5EEE-459D-AAB4-18AC1573C5F6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2C73920-8D86-4511-981D-944AD53965D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F8503F5-454C-4EB9-86DC-853CB7D3BF9C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "65AAE0BE-B955-428C-8DB3-EDC69D513B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86246FAC-8D36-41FE-85EC-9362D938A85B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCFD34-9E11-4F33-AE7B-4F20F7B3A1C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F63B515-D60A-41C8-AD93-DBCE2440E6AD", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F36333F5-C4F5-4BB2-940C-88D9F886D398", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F703C1A8-E64A-4486-9F1A-11D0FF4EC5CE", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEA388CA-199C-487F-82F0-752FFA204286", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E7BA6AA-9EE5-46A8-AC4C-466A87159D95", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "145A2735-5820-4060-80A0-51F3D7CABCCE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB462B54-F23B-4939-B9DF-2DFDE242C322", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8E6D37D-CD68-4E62-97BA-B6E87565C04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2896256B-54D6-45EC-9F23-9D27ABD04FBD", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "64A930B4-B043-4AF9-95E4-562AB65A9CDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86638803-6014-4DE7-BBC9-26F2137368FF", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B29B0F1-0575-4EFF-9A45-6E86526A2C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C202168C-3666-4726-93A4-8AA0F910B322", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6711A4E5-F1D8-4C4E-BD2A-52FB66F670F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B0F7D65-7F08-4AFA-A30A-E29DCDFD49A7", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "75ADE518-83D1-4275-8E55-5412238EFC86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DD1476B-B648-4EB7-A233-75FFDC4FCF1E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "C689B536-4889-4BA1-AB29-ACE7C5DC952D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FADBEE27-6C34-4F1C-B1FF-FC90263D3CB8", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C91F7180-8FC6-4A74-B59E-D11E9AC529A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "748065CA-4349-48DC-96D9-0FB05F3BF098", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "69EEDC14-3565-4808-9EC5-F27B201D48B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E768FF9-FAEB-44D1-95E5-8A416C934371", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEADBFB7-64EB-4E1B-86DB-364E2F0111D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C480A-5367-46C1-85A5-E3210E0C670A", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "17BF3C14-D5BE-4369-867E-7DEE972FEC97", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749457D9-5269-43C3-A6A2-F1DF27D87F1A", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ABB933B-A0CB-431E-A51D-EB630BFE92D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9A526F2-8568-4088-87AF-B63D5063594B", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "29F68ADA-AE16-4FFC-9374-2AFFBCCFBF57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3695DC89-A027-49A6-A39E-77BDAE7A424E", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F572FA7-7520-4F5F-8398-42B3788C8B8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD226E1F-DAE6-47B5-B5F3-46FAE2B7C2FD", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9B389AF-83A2-4A35-96BE-7971B1B3E4FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "238EAECC-E3A2-426B-9A5A-9F48D985B322", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "08EF9BFC-B45B-4F5E-8745-B335EFE638A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A07EA3C4-2722-43B4-9AD7-EFCD92BDCED8", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F88B615C-BE6A-4B1C-95A7-5B37796159C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5058559A-1141-4B2C-AD06-58DD3E590C56", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D507239-F351-4DA0-80D0-96ACB9419EC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9018404B-910F-4247-AB18-CA644A052FEE", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "91198EE7-4205-478E-B7A8-987F977AD82C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "189D5ACC-D0F2-428B-A90C-2FA39D6D6C20", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DA7C0A-2F37-461D-AFA8-BF73C653F47E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41D304A9-E038-44F4-A139-896A51DB25A5", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EA7D60F-4670-4AAE-8A31-89C60A38EA43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33B8C349-4B07-4172-A629-4C0FBDE943A2", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "392DB5FC-65AA-4E08-8E9F-AA66F6135078", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8F1E348-4C0F-420B-9275-2D5257D6E8BA", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC4F8DC4-26C0-4D82-A7B6-8285158A1F21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a hard-coded cryptographic key, which increases the possibility that confidential data can be recovered." }, { "lang": "es", "value": "En Moxa la serie PT-7528 firmware, versiones 4.0 o inferiores y la serie PT-7828 firmware, versiones 3.9 o inferiores, los productos afectados utilizan una clave criptogr\u00e1fica embebida, lo que aumenta la posibilidad de que datos confidenciales puedan ser recuperados." } ], "id": "CVE-2020-6983", "lastModified": "2024-11-21T05:36:25.897", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-24T19:15:21.257", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-321" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23172D9F-8C29-436C-8D1D-C6C69A7D544B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8DA48C-AC0C-4134-96E5-58D1DE15E83F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87870519-31E2-438F-9E4B-80C1E960BAA6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4161EA3-F10A-4311-9C91-A19CFD97B6E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9662C706-550D-4A2A-B811-46FC67D4ECD8", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB152B69-992F-4C89-A5C5-00F67E19BC9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E2ECB8C-6E44-4884-A543-92B3FADBF913", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "941BB098-D358-4F8C-BCD6-0AE9E1F9B515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8350B35C-F6AD-49ED-B165-A318EFCF9057", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5B4B95C-7D87-4F5A-9499-97FBA99A93FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "598CFEF6-EDE3-4446-BF7B-459E2AC51D43", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CFBC387-D664-4789-B3F7-7B87667963EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4B85577-5789-49D4-8F55-E9674BFAADE8", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C532A7-AFC5-4F8B-9FCA-365DE8CAAD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20CF217C-21DD-4181-9489-B59168E48B69", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "310FA2C6-C219-4C22-BABD-8CD3B4DBA20A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E30F784-5FC1-4F9B-8E87-939028052B9F", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B10C85C-B21A-427F-B8DA-5D7EB00382F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAF33C5F-51BA-433F-96F5-C56DA78DA78E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB085777-7FC8-4FC5-869C-9DF351B16799", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A1D658-9F40-4D0D-A243-EF91342224DA", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAEA10F5-9E52-4658-851A-7ABDD4135E90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B21B040-6F79-4845-8A57-51361637401D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B5BB02-8C2F-4E98-BB60-E5F261681C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63B66690-697D-4DD0-A7FF-83185174E8EC", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AA88D4-4BCF-43C4-BDD3-2F8C8E596046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBF1C1B-3DA2-4EE4-A36B-83C5B84232E6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0414660-74EF-49F0-9DBA-0305B835D408", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46683121-C8D6-40C9-86F0-A3F44977BD71", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF4DD3C6-78B5-4458-B487-63D37027CF99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CF72041-8378-497F-86EF-E7AE3B7A855C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "62C16033-43B1-41C0-87E7-4ABEB1EA6761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76DF7328-037B-4D75-BFF1-D22FE32D1F9D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "674D3631-53DF-4E98-BC1E-C4122DF3F26A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A376430A-4F8E-4B91-83E4-C9D14A601C2E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB472079-8ECF-44E2-969E-4FB5CF0E3971", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "055969EC-1F60-4F95-B686-535A71F5F496", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A7A8554-54A1-4B4C-A583-90FC0EC49A11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "379BD1B2-68D5-4BB2-A816-DCB69183267D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "95E4FE31-0EC0-4034-8099-BCEC33E421ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A249EAAC-7B5C-4ADA-A5D1-E612D2F580F2", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6431F64E-9899-4F01-8814-1A92A36353C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41C54026-899E-4D3C-8ECD-B9D1C6751B26", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "D937271E-9E14-446A-B5DD-7B1E6D2B5C9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0783C349-5E13-4B8E-BE92-DFB18DE31643", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE86A9B-1C3F-4208-A238-3E70031D3856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "567BC006-28FB-44F2-A779-B4B8320F3A3B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9E901-A046-4CC2-A3E5-42E42EA3308C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C377E2E-43F1-4CDA-9386-074374EFD71C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABF64C98-AF29-4C56-9E21-081E5DBE0B79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83852BAA-F68C-4273-B822-25280EBE3D00", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F676041D-CF87-403D-9911-5B6DA9B21CC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B07BFA5-350C-401A-B063-B0322157784C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECF8194D-BAA0-4F1F-AAC3-C5B96E4D0368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E2DDC4-5EEE-459D-AAB4-18AC1573C5F6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2C73920-8D86-4511-981D-944AD53965D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F8503F5-454C-4EB9-86DC-853CB7D3BF9C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "65AAE0BE-B955-428C-8DB3-EDC69D513B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86246FAC-8D36-41FE-85EC-9362D938A85B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCFD34-9E11-4F33-AE7B-4F20F7B3A1C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F63B515-D60A-41C8-AD93-DBCE2440E6AD", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F36333F5-C4F5-4BB2-940C-88D9F886D398", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F703C1A8-E64A-4486-9F1A-11D0FF4EC5CE", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEA388CA-199C-487F-82F0-752FFA204286", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E7BA6AA-9EE5-46A8-AC4C-466A87159D95", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "145A2735-5820-4060-80A0-51F3D7CABCCE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB462B54-F23B-4939-B9DF-2DFDE242C322", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8E6D37D-CD68-4E62-97BA-B6E87565C04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2896256B-54D6-45EC-9F23-9D27ABD04FBD", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "64A930B4-B043-4AF9-95E4-562AB65A9CDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86638803-6014-4DE7-BBC9-26F2137368FF", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B29B0F1-0575-4EFF-9A45-6E86526A2C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C202168C-3666-4726-93A4-8AA0F910B322", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6711A4E5-F1D8-4C4E-BD2A-52FB66F670F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B0F7D65-7F08-4AFA-A30A-E29DCDFD49A7", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "75ADE518-83D1-4275-8E55-5412238EFC86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DD1476B-B648-4EB7-A233-75FFDC4FCF1E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "C689B536-4889-4BA1-AB29-ACE7C5DC952D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FADBEE27-6C34-4F1C-B1FF-FC90263D3CB8", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C91F7180-8FC6-4A74-B59E-D11E9AC529A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "748065CA-4349-48DC-96D9-0FB05F3BF098", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "69EEDC14-3565-4808-9EC5-F27B201D48B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E768FF9-FAEB-44D1-95E5-8A416C934371", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEADBFB7-64EB-4E1B-86DB-364E2F0111D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C480A-5367-46C1-85A5-E3210E0C670A", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "17BF3C14-D5BE-4369-867E-7DEE972FEC97", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749457D9-5269-43C3-A6A2-F1DF27D87F1A", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ABB933B-A0CB-431E-A51D-EB630BFE92D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9A526F2-8568-4088-87AF-B63D5063594B", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "29F68ADA-AE16-4FFC-9374-2AFFBCCFBF57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3695DC89-A027-49A6-A39E-77BDAE7A424E", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F572FA7-7520-4F5F-8398-42B3788C8B8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD226E1F-DAE6-47B5-B5F3-46FAE2B7C2FD", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9B389AF-83A2-4A35-96BE-7971B1B3E4FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "238EAECC-E3A2-426B-9A5A-9F48D985B322", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "08EF9BFC-B45B-4F5E-8745-B335EFE638A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A07EA3C4-2722-43B4-9AD7-EFCD92BDCED8", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F88B615C-BE6A-4B1C-95A7-5B37796159C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5058559A-1141-4B2C-AD06-58DD3E590C56", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D507239-F351-4DA0-80D0-96ACB9419EC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9018404B-910F-4247-AB18-CA644A052FEE", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "91198EE7-4205-478E-B7A8-987F977AD82C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "189D5ACC-D0F2-428B-A90C-2FA39D6D6C20", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DA7C0A-2F37-461D-AFA8-BF73C653F47E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41D304A9-E038-44F4-A139-896A51DB25A5", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EA7D60F-4670-4AAE-8A31-89C60A38EA43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33B8C349-4B07-4172-A629-4C0FBDE943A2", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "392DB5FC-65AA-4E08-8E9F-AA66F6135078", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8F1E348-4C0F-420B-9275-2D5257D6E8BA", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC4F8DC4-26C0-4D82-A7B6-8285158A1F21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed." }, { "lang": "es", "value": "En Moxa la serie PT-7528 firmware, versiones 4.0 o inferiores y la serie PT-7828 firmware, versiones 3.9 o inferiores, los productos afectados utilizan un algoritmo criptogr\u00e1fico d\u00e9bil, que puede permitir una divulgaci\u00f3n de informaci\u00f3n confidencial." } ], "id": "CVE-2020-6987", "lastModified": "2024-11-21T05:36:26.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-24T19:15:21.337", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23172D9F-8C29-436C-8D1D-C6C69A7D544B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8DA48C-AC0C-4134-96E5-58D1DE15E83F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87870519-31E2-438F-9E4B-80C1E960BAA6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4161EA3-F10A-4311-9C91-A19CFD97B6E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9662C706-550D-4A2A-B811-46FC67D4ECD8", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB152B69-992F-4C89-A5C5-00F67E19BC9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E2ECB8C-6E44-4884-A543-92B3FADBF913", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "941BB098-D358-4F8C-BCD6-0AE9E1F9B515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8350B35C-F6AD-49ED-B165-A318EFCF9057", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5B4B95C-7D87-4F5A-9499-97FBA99A93FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "598CFEF6-EDE3-4446-BF7B-459E2AC51D43", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CFBC387-D664-4789-B3F7-7B87667963EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4B85577-5789-49D4-8F55-E9674BFAADE8", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C532A7-AFC5-4F8B-9FCA-365DE8CAAD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20CF217C-21DD-4181-9489-B59168E48B69", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "310FA2C6-C219-4C22-BABD-8CD3B4DBA20A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E30F784-5FC1-4F9B-8E87-939028052B9F", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B10C85C-B21A-427F-B8DA-5D7EB00382F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAF33C5F-51BA-433F-96F5-C56DA78DA78E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB085777-7FC8-4FC5-869C-9DF351B16799", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A1D658-9F40-4D0D-A243-EF91342224DA", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAEA10F5-9E52-4658-851A-7ABDD4135E90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B21B040-6F79-4845-8A57-51361637401D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B5BB02-8C2F-4E98-BB60-E5F261681C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63B66690-697D-4DD0-A7FF-83185174E8EC", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AA88D4-4BCF-43C4-BDD3-2F8C8E596046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBF1C1B-3DA2-4EE4-A36B-83C5B84232E6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0414660-74EF-49F0-9DBA-0305B835D408", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46683121-C8D6-40C9-86F0-A3F44977BD71", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF4DD3C6-78B5-4458-B487-63D37027CF99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CF72041-8378-497F-86EF-E7AE3B7A855C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "62C16033-43B1-41C0-87E7-4ABEB1EA6761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76DF7328-037B-4D75-BFF1-D22FE32D1F9D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "674D3631-53DF-4E98-BC1E-C4122DF3F26A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A376430A-4F8E-4B91-83E4-C9D14A601C2E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB472079-8ECF-44E2-969E-4FB5CF0E3971", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "055969EC-1F60-4F95-B686-535A71F5F496", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A7A8554-54A1-4B4C-A583-90FC0EC49A11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "379BD1B2-68D5-4BB2-A816-DCB69183267D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "95E4FE31-0EC0-4034-8099-BCEC33E421ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A249EAAC-7B5C-4ADA-A5D1-E612D2F580F2", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6431F64E-9899-4F01-8814-1A92A36353C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41C54026-899E-4D3C-8ECD-B9D1C6751B26", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "D937271E-9E14-446A-B5DD-7B1E6D2B5C9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0783C349-5E13-4B8E-BE92-DFB18DE31643", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE86A9B-1C3F-4208-A238-3E70031D3856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "567BC006-28FB-44F2-A779-B4B8320F3A3B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9E901-A046-4CC2-A3E5-42E42EA3308C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C377E2E-43F1-4CDA-9386-074374EFD71C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABF64C98-AF29-4C56-9E21-081E5DBE0B79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83852BAA-F68C-4273-B822-25280EBE3D00", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F676041D-CF87-403D-9911-5B6DA9B21CC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B07BFA5-350C-401A-B063-B0322157784C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECF8194D-BAA0-4F1F-AAC3-C5B96E4D0368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E2DDC4-5EEE-459D-AAB4-18AC1573C5F6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2C73920-8D86-4511-981D-944AD53965D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F8503F5-454C-4EB9-86DC-853CB7D3BF9C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "65AAE0BE-B955-428C-8DB3-EDC69D513B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86246FAC-8D36-41FE-85EC-9362D938A85B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCFD34-9E11-4F33-AE7B-4F20F7B3A1C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F63B515-D60A-41C8-AD93-DBCE2440E6AD", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F36333F5-C4F5-4BB2-940C-88D9F886D398", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F703C1A8-E64A-4486-9F1A-11D0FF4EC5CE", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEA388CA-199C-487F-82F0-752FFA204286", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E7BA6AA-9EE5-46A8-AC4C-466A87159D95", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "145A2735-5820-4060-80A0-51F3D7CABCCE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB462B54-F23B-4939-B9DF-2DFDE242C322", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8E6D37D-CD68-4E62-97BA-B6E87565C04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2896256B-54D6-45EC-9F23-9D27ABD04FBD", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "64A930B4-B043-4AF9-95E4-562AB65A9CDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86638803-6014-4DE7-BBC9-26F2137368FF", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B29B0F1-0575-4EFF-9A45-6E86526A2C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C202168C-3666-4726-93A4-8AA0F910B322", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6711A4E5-F1D8-4C4E-BD2A-52FB66F670F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B0F7D65-7F08-4AFA-A30A-E29DCDFD49A7", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "75ADE518-83D1-4275-8E55-5412238EFC86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DD1476B-B648-4EB7-A233-75FFDC4FCF1E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "C689B536-4889-4BA1-AB29-ACE7C5DC952D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FADBEE27-6C34-4F1C-B1FF-FC90263D3CB8", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C91F7180-8FC6-4A74-B59E-D11E9AC529A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "748065CA-4349-48DC-96D9-0FB05F3BF098", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "69EEDC14-3565-4808-9EC5-F27B201D48B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E768FF9-FAEB-44D1-95E5-8A416C934371", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEADBFB7-64EB-4E1B-86DB-364E2F0111D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C480A-5367-46C1-85A5-E3210E0C670A", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "17BF3C14-D5BE-4369-867E-7DEE972FEC97", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749457D9-5269-43C3-A6A2-F1DF27D87F1A", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ABB933B-A0CB-431E-A51D-EB630BFE92D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9A526F2-8568-4088-87AF-B63D5063594B", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "29F68ADA-AE16-4FFC-9374-2AFFBCCFBF57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3695DC89-A027-49A6-A39E-77BDAE7A424E", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F572FA7-7520-4F5F-8398-42B3788C8B8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD226E1F-DAE6-47B5-B5F3-46FAE2B7C2FD", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9B389AF-83A2-4A35-96BE-7971B1B3E4FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "238EAECC-E3A2-426B-9A5A-9F48D985B322", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "08EF9BFC-B45B-4F5E-8745-B335EFE638A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A07EA3C4-2722-43B4-9AD7-EFCD92BDCED8", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F88B615C-BE6A-4B1C-95A7-5B37796159C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5058559A-1141-4B2C-AD06-58DD3E590C56", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D507239-F351-4DA0-80D0-96ACB9419EC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9018404B-910F-4247-AB18-CA644A052FEE", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "91198EE7-4205-478E-B7A8-987F977AD82C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "189D5ACC-D0F2-428B-A90C-2FA39D6D6C20", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DA7C0A-2F37-461D-AFA8-BF73C653F47E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41D304A9-E038-44F4-A139-896A51DB25A5", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EA7D60F-4670-4AAE-8A31-89C60A38EA43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33B8C349-4B07-4172-A629-4C0FBDE943A2", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "392DB5FC-65AA-4E08-8E9F-AA66F6135078", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8F1E348-4C0F-420B-9275-2D5257D6E8BA", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC4F8DC4-26C0-4D82-A7B6-8285158A1F21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the application utilizes weak password requirements, which may allow an attacker to gain unauthorized access." }, { "lang": "es", "value": "En Moxa la serie PT-7528 firmware, versi\u00f3n 4.0 o inferior, y la serie PT-7828 firmware, versi\u00f3n 3.9 o inferior, la aplicaci\u00f3n usa requisitos de contrase\u00f1a d\u00e9biles, lo cual puede permitir a un atacante conseguir acceso no autorizado." } ], "id": "CVE-2020-6995", "lastModified": "2024-11-21T05:36:27.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-24T20:15:15.100", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-521" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-521" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23172D9F-8C29-436C-8D1D-C6C69A7D544B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A8DA48C-AC0C-4134-96E5-58D1DE15E83F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87870519-31E2-438F-9E4B-80C1E960BAA6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4161EA3-F10A-4311-9C91-A19CFD97B6E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9662C706-550D-4A2A-B811-46FC67D4ECD8", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB152B69-992F-4C89-A5C5-00F67E19BC9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E2ECB8C-6E44-4884-A543-92B3FADBF913", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "941BB098-D358-4F8C-BCD6-0AE9E1F9B515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8350B35C-F6AD-49ED-B165-A318EFCF9057", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5B4B95C-7D87-4F5A-9499-97FBA99A93FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "598CFEF6-EDE3-4446-BF7B-459E2AC51D43", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CFBC387-D664-4789-B3F7-7B87667963EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4B85577-5789-49D4-8F55-E9674BFAADE8", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C532A7-AFC5-4F8B-9FCA-365DE8CAAD41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20CF217C-21DD-4181-9489-B59168E48B69", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "310FA2C6-C219-4C22-BABD-8CD3B4DBA20A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E30F784-5FC1-4F9B-8E87-939028052B9F", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B10C85C-B21A-427F-B8DA-5D7EB00382F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAF33C5F-51BA-433F-96F5-C56DA78DA78E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB085777-7FC8-4FC5-869C-9DF351B16799", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A1D658-9F40-4D0D-A243-EF91342224DA", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAEA10F5-9E52-4658-851A-7ABDD4135E90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B21B040-6F79-4845-8A57-51361637401D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B5BB02-8C2F-4E98-BB60-E5F261681C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63B66690-697D-4DD0-A7FF-83185174E8EC", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AA88D4-4BCF-43C4-BDD3-2F8C8E596046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBF1C1B-3DA2-4EE4-A36B-83C5B84232E6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0414660-74EF-49F0-9DBA-0305B835D408", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46683121-C8D6-40C9-86F0-A3F44977BD71", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF4DD3C6-78B5-4458-B487-63D37027CF99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CF72041-8378-497F-86EF-E7AE3B7A855C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "62C16033-43B1-41C0-87E7-4ABEB1EA6761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76DF7328-037B-4D75-BFF1-D22FE32D1F9D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "674D3631-53DF-4E98-BC1E-C4122DF3F26A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A376430A-4F8E-4B91-83E4-C9D14A601C2E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB472079-8ECF-44E2-969E-4FB5CF0E3971", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "055969EC-1F60-4F95-B686-535A71F5F496", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A7A8554-54A1-4B4C-A583-90FC0EC49A11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "379BD1B2-68D5-4BB2-A816-DCB69183267D", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "95E4FE31-0EC0-4034-8099-BCEC33E421ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A249EAAC-7B5C-4ADA-A5D1-E612D2F580F2", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6431F64E-9899-4F01-8814-1A92A36353C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41C54026-899E-4D3C-8ECD-B9D1C6751B26", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "D937271E-9E14-446A-B5DD-7B1E6D2B5C9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0783C349-5E13-4B8E-BE92-DFB18DE31643", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE86A9B-1C3F-4208-A238-3E70031D3856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "567BC006-28FB-44F2-A779-B4B8320F3A3B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9E901-A046-4CC2-A3E5-42E42EA3308C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C377E2E-43F1-4CDA-9386-074374EFD71C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABF64C98-AF29-4C56-9E21-081E5DBE0B79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83852BAA-F68C-4273-B822-25280EBE3D00", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F676041D-CF87-403D-9911-5B6DA9B21CC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B07BFA5-350C-401A-B063-B0322157784C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECF8194D-BAA0-4F1F-AAC3-C5B96E4D0368", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E2DDC4-5EEE-459D-AAB4-18AC1573C5F6", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2C73920-8D86-4511-981D-944AD53965D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F8503F5-454C-4EB9-86DC-853CB7D3BF9C", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "65AAE0BE-B955-428C-8DB3-EDC69D513B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86246FAC-8D36-41FE-85EC-9362D938A85B", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCCFD34-9E11-4F33-AE7B-4F20F7B3A1C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F63B515-D60A-41C8-AD93-DBCE2440E6AD", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F36333F5-C4F5-4BB2-940C-88D9F886D398", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F703C1A8-E64A-4486-9F1A-11D0FF4EC5CE", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEA388CA-199C-487F-82F0-752FFA204286", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E7BA6AA-9EE5-46A8-AC4C-466A87159D95", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "145A2735-5820-4060-80A0-51F3D7CABCCE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB462B54-F23B-4939-B9DF-2DFDE242C322", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8E6D37D-CD68-4E62-97BA-B6E87565C04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2896256B-54D6-45EC-9F23-9D27ABD04FBD", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "64A930B4-B043-4AF9-95E4-562AB65A9CDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86638803-6014-4DE7-BBC9-26F2137368FF", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B29B0F1-0575-4EFF-9A45-6E86526A2C19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C202168C-3666-4726-93A4-8AA0F910B322", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "6711A4E5-F1D8-4C4E-BD2A-52FB66F670F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B0F7D65-7F08-4AFA-A30A-E29DCDFD49A7", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "75ADE518-83D1-4275-8E55-5412238EFC86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DD1476B-B648-4EB7-A233-75FFDC4FCF1E", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*", "matchCriteriaId": "C689B536-4889-4BA1-AB29-ACE7C5DC952D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FADBEE27-6C34-4F1C-B1FF-FC90263D3CB8", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C91F7180-8FC6-4A74-B59E-D11E9AC529A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "748065CA-4349-48DC-96D9-0FB05F3BF098", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "69EEDC14-3565-4808-9EC5-F27B201D48B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-24-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E768FF9-FAEB-44D1-95E5-8A416C934371", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-24-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEADBFB7-64EB-4E1B-86DB-364E2F0111D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C480A-5367-46C1-85A5-E3210E0C670A", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "17BF3C14-D5BE-4369-867E-7DEE972FEC97", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "749457D9-5269-43C3-A6A2-F1DF27D87F1A", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ABB933B-A0CB-431E-A51D-EB630BFE92D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-48-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9A526F2-8568-4088-87AF-B63D5063594B", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-48-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "29F68ADA-AE16-4FFC-9374-2AFFBCCFBF57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3695DC89-A027-49A6-A39E-77BDAE7A424E", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F572FA7-7520-4F5F-8398-42B3788C8B8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-f-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD226E1F-DAE6-47B5-B5F3-46FAE2B7C2FD", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-f-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9B389AF-83A2-4A35-96BE-7971B1B3E4FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "238EAECC-E3A2-426B-9A5A-9F48D985B322", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "08EF9BFC-B45B-4F5E-8745-B335EFE638A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24-24_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A07EA3C4-2722-43B4-9AD7-EFCD92BDCED8", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "F88B615C-BE6A-4B1C-95A7-5B37796159C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-24-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5058559A-1141-4B2C-AD06-58DD3E590C56", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-24-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D507239-F351-4DA0-80D0-96ACB9419EC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9018404B-910F-4247-AB18-CA644A052FEE", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "91198EE7-4205-478E-B7A8-987F977AD82C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48-48_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "189D5ACC-D0F2-428B-A90C-2FA39D6D6C20", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DA7C0A-2F37-461D-AFA8-BF73C653F47E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-48-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41D304A9-E038-44F4-A139-896A51DB25A5", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-48-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EA7D60F-4670-4AAE-8A31-89C60A38EA43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33B8C349-4B07-4172-A629-4C0FBDE943A2", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "392DB5FC-65AA-4E08-8E9F-AA66F6135078", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:pt-7828-r-hv-hv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8F1E348-4C0F-420B-9275-2D5257D6E8BA", "versionEndIncluding": "3.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:pt-7828-r-hv-hv:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC4F8DC4-26C0-4D82-A7B6-8285158A1F21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code." }, { "lang": "es", "value": "En Moxa la serie PT-7528 firmware, versiones 4.0 o inferiores y la serie PT-7828 firmware, versiones 3.9 o inferiores, un desbordamiento del b\u00fafer en el servidor web permite a atacantes remotos causar una condici\u00f3n de denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario." } ], "id": "CVE-2020-6989", "lastModified": "2024-11-21T05:36:26.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-24T19:15:21.400", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }