Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-9361 (GCVE-0-2016-9361)
Vulnerability from cvelistv5
- Moxa NPort Device password retrieval
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa NPort |
Version: Moxa NPort |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:37.128Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/85965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa NPort", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa NPort" } ] } ], "datePublic": "2017-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating." } ], "problemTypes": [ { "descriptions": [ { "description": "Moxa NPort Device password retrieval", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-14T13:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/85965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-9361", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa NPort", "version": { "version_data": [ { "version_value": "Moxa NPort" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Moxa NPort Device password retrieval" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85965" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-9361", "datePublished": "2017-02-13T21:00:00", "dateReserved": "2016-11-16T00:00:00", "dateUpdated": "2024-08-06T02:50:37.128Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-9361\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2017-02-13T21:59:02.080\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating.\"},{\"lang\":\"es\",\"value\":\"Ha sido descubierto un problema en Moxa NPort 5110 versiones anteriores a 2.6, NPort 5130/5150 Series versiones anteriores a 3.6, NPort 5200 Series versiones anteriores a 2.8, NPort 5400 Series versiones anteriores a 3.11, NPort 5600 Series versiones anteriores a 3.7, NPort 5100A Series \u0026 NPort P5150A versiones anteriores a 1.3, NPort 5200A Series versiones anteriores a 1.3, NPort 5150AI-M12 Series versiones anteriores a 1.2, NPort 5250AI-M12 Series versiones anteriores a 1.2, NPort 5450AI-M12 Series versiones anteriores a 1.2, NPort 5600-8-DT Series versiones anteriores a 2.4, NPort 5600-8-DTL Series versiones anteriores a 2.4, NPort 6x50 Series versiones anteriores a 1.13.11, NPort IA5450A versiones anteriores a v1.4. Las contrase\u00f1as de administraci\u00f3n se pueden volver a intentar sin autenticar.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.5\",\"matchCriteriaId\":\"F8B36FF8-808A-4BFB-BF3E-C454449EC761\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9D28B00-C0BD-4B70-B871-9D18F37DCBE9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.5\",\"matchCriteriaId\":\"747C55F4-D7CF-418B-BAFB-64CE71F4DD63\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5507650-F3BF-45AF-AA54-06CF3EAF7DDB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CD7B68B-128D-4AB0-AE9E-A8B9329D67C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7\",\"matchCriteriaId\":\"A24577B4-5E3C-4727-8A50-EA3C33401636\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18402F31-34ED-431B-A9D3-1EDC546B9381\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A98BEE65-958C-45B0-915B-BEB39E356CBE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C40A47B2-55B7-43E3-9E01-34CB57D16267\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E1D65E4-3836-41FC-9F06-A78D7D0AB2EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.10\",\"matchCriteriaId\":\"5834C0C2-0C1F-40AA-BBE8-1A01E10A43AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD9C3024-D682-4C4E-AF88-29F9FEA8AF12\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A398369-6E35-492C-9D85-6564B030E858\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF39890-7A93-43EA-964C-3AE5B747E0E7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38683F12-3FFD-4E9F-BDBF-6AD386A59091\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E747BEA-5087-4E3C-8DFF-EFFD84FE187F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FE28734-0DC6-4150-B282-E85FA86CD3F0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AB85377-D610-40C0-9BAA-482A6F039D31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.6\",\"matchCriteriaId\":\"649F9322-D82E-4C2D-944F-748C581BF1E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF626E1-EC48-4D6B-9942-035122B9A887\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6B68C29-57E5-427A-AA83-D0A44E18E468\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6947F0B7-12D9-47B7-BABD-3579D620EC4A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2\",\"matchCriteriaId\":\"76059B73-20B0-4BF5-BAD9-A1D00F9DACAD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A659CBC-2A65-46AB-ACED-2C5EFC17BE71\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC23CCC6-A408-452A-96F2-046662551832\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"184129E6-9A9C-49BB-AE95-D0CEC1C5EBF2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2\",\"matchCriteriaId\":\"FB976330-9062-48C3-9ED9-0B696CB778AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF26B8A9-FDC5-4634-B341-7C6F2E1BCBF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2\",\"matchCriteriaId\":\"4AF38EB9-EFE7-4A1B-94D7-5E5011FFBBA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42B39317-D97B-4E9B-A6C3-B006B7A078F6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23518919-EAD2-43B9-91EB-946C044073F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED314ED8-2665-44F4-9FFF-940547392B6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1\",\"matchCriteriaId\":\"B8233CDC-98F0-46F3-AB55-DC7DEF9630AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"647275A0-6F25-4002-AE26-5F8397159FB1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0908C5BA-5568-4612-A96B-3869979FCB83\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9152230A-AC8C-4B43-99A9-6AF4C26CE4C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E919D3F5-12E4-42F4-BE48-D426240BE2AF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DCA3A9-CEF1-493F-89EB-B39275906E32\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1FDA9E-2D80-4407-94F6-6787EB605E37\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479014A6-4878-4372-82F9-9274FC90F487\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"968A147A-9E5C-46E3-AE27-155EF7332D60\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10C16DCC-6489-43D8-96BF-4F4D10561956\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41216A7C-065A-4022-9ECD-35052C033C24\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D5BE975-D504-4F21-BC05-F5087F9BAD57\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD728AD5-D527-4A88-B80E-C278E9369AA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.3\",\"matchCriteriaId\":\"7383E19A-8524-4CF0-8E6A-D6598BFBBEBF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ADBF536-3320-4F38-BF68-CC69EEB07454\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B68B983-04C3-494A-9B1B-BB57A456E3FF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DAE50DD-65CC-467E-878C-6EC68BF1743B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.13\",\"matchCriteriaId\":\"D0D45D46-9160-43D3-9D94-407127CDC184\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87373328-5B7A-49DE-B18C-A35433B05786\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16561579-3023-4987-BA2D-510E7F702F95\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/85965\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/85965\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
cnvd-2016-11885
Vulnerability from cnvd
Title: Moxa NPort凭证管理漏洞
Description:
MOXA Nport是一款串口通讯服务器。
Moxa NPort存在凭证管理漏洞。未经身份验证的攻击者利用漏洞可获取管理员密码。
Severity: 高
Patch Name: Moxa NPort凭证管理漏洞的补丁
Patch Description:
MOXA Nport是一款串口通讯服务器。
Moxa NPort存在凭证管理漏洞。未经身份验证的攻击者利用漏洞可获取管理员密码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了升级版本,请及时下载更新: NPort 5110 Version 2.6: http://www.moxa.com/support/download.aspx?type=support&id=882 (link is external) NPort 5130/5150 Series Version 3.6: http://www.moxa.com/support/download.aspx?type=support&id=356 (link is external) NPort 5200 Series Version 2.8: http://www.moxa.com/support/download.aspx?type=support&id=904 (link is external) NPort 5400 Series Version 3.11: http://www.moxa.com/support/download.aspx?type=support&id=925 (link is external) NPort 5600 Series Version 3.7: http://www.moxa.com/support/download.aspx?type=support&id=905 (link is external) NPort 5100A Series & NPort P5150A Version 1.3: http://www.moxa.com/support/download.aspx?type=support&id=1403 (link is external) NPort 5200A Series Version 1.3: http://www.moxa.com/support/download.aspx?type=support&id=1462 (link is external) NPort 5150AI-M12 Series Version 1.2: http://www.moxa.com/support/download.aspx?type=support&id=2206 (link is external) NPort 5250AI-M12 Series Version 1.2: http://www.moxa.com/support/download.aspx?type=support&id=2207 (link is external) NPort 5450AI-M12 Series Version 1.2: http://www.moxa.com/support/download.aspx?type=support&id=2208 (link is external) NPort 5600-8-DT Series Version 2.4: http://www.moxa.com/support/download.aspx?type=support&id=938 (link is external) NPort 5600-8-DTL Series Version 1.3: http://www.moxa.com/support/download.aspx?type=support&id=1819 (link is external) NPort 6x50 Series Version 1.14: http://www.moxa.com/support/download.aspx?type=support&id=733 (link is external) NPort IA5450A Version 1.4: http://www.moxa.com/support/download.aspx?type=support&id=1469
Reference: https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02
Name | ['Moxa NPort 5110 <2.6', 'Moxa NPort 5130/5150 <3.6', 'Moxa NPort 5200 <2.8', 'Moxa NPort 5400 <3.11', 'Moxa NPort 5600 <3.7', 'Moxa NPort P5150A <1.3', 'Moxa NPort 5100A <1.3', 'Moxa NPort 5200A <1.3', 'Moxa NPort 5150AI-M12 <1.2', 'Moxa NPort 5250AI-M12 <1.2', 'Moxa NPort 5450AI-M12 <1.2', 'Moxa NPort 5600-8-DT <2.4', 'Moxa NPort 5600-8-DTL <2.4', 'Moxa NPort 6x50 <1.13.11', 'Moxa NPort IA5450A <1.4'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2016-9361" } }, "description": "MOXA Nport\u662f\u4e00\u6b3e\u4e32\u53e3\u901a\u8baf\u670d\u52a1\u5668\u3002\r\n\r\nMoxa NPort\u5b58\u5728\u51ed\u8bc1\u7ba1\u7406\u6f0f\u6d1e\u3002\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u53ef\u83b7\u53d6\u7ba1\u7406\u5458\u5bc6\u7801\u3002", "discovererName": "Reid Wightman of Digital Bonds Labs", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u5347\u7ea7\u7248\u672c\uff0c\u8bf7\u53ca\u65f6\u4e0b\u8f7d\u66f4\u65b0\uff1a\r\nNPort 5110 Version 2.6:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=882 (link is external)\r\nNPort 5130/5150 Series Version 3.6:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=356 (link is external)\r\nNPort 5200 Series Version 2.8:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=904 (link is external)\r\nNPort 5400 Series Version 3.11:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=925 (link is external)\r\nNPort 5600 Series Version 3.7:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=905 (link is external)\r\nNPort 5100A Series \u0026 NPort P5150A Version 1.3:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=1403 (link is external)\r\nNPort 5200A Series Version 1.3:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=1462 (link is external)\r\nNPort 5150AI-M12 Series Version 1.2:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=2206 (link is external)\r\nNPort 5250AI-M12 Series Version 1.2:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=2207 (link is external)\r\nNPort 5450AI-M12 Series Version 1.2:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=2208 (link is external)\r\nNPort 5600-8-DT Series Version 2.4:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=938 (link is external)\r\nNPort 5600-8-DTL Series Version 1.3:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=1819 (link is external)\r\nNPort 6x50 Series Version 1.14:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=733 (link is external)\r\nNPort IA5450A Version 1.4:\r\nhttp://www.moxa.com/support/download.aspx?type=support\u0026id=1469", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2016-11885", "openTime": "2016-12-05", "patchDescription": "MOXA Nport\u662f\u4e00\u6b3e\u4e32\u53e3\u901a\u8baf\u670d\u52a1\u5668\u3002\r\n\r\nMoxa NPort\u5b58\u5728\u51ed\u8bc1\u7ba1\u7406\u6f0f\u6d1e\u3002\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u53ef\u83b7\u53d6\u7ba1\u7406\u5458\u5bc6\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Moxa NPort\u51ed\u8bc1\u7ba1\u7406\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Moxa NPort 5110 \u003c2.6", "Moxa NPort 5130/5150 \u003c3.6", "Moxa NPort 5200 \u003c2.8", "Moxa NPort 5400 \u003c3.11", "Moxa NPort 5600 \u003c3.7", "Moxa NPort P5150A \u003c1.3", "Moxa NPort 5100A \u003c1.3", "Moxa NPort 5200A \u003c1.3", "Moxa NPort 5150AI-M12 \u003c1.2", "Moxa NPort 5250AI-M12 \u003c1.2", "Moxa NPort 5450AI-M12 \u003c1.2", "Moxa NPort 5600-8-DT \u003c2.4", "Moxa NPort 5600-8-DTL \u003c2.4", "Moxa NPort 6x50 \u003c1.13.11", "Moxa NPort IA5450A \u003c1.4" ] }, "referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02", "serverity": "\u9ad8", "submitTime": "2016-12-05", "title": "Moxa NPort\u51ed\u8bc1\u7ba1\u7406\u6f0f\u6d1e" }
gsd-2016-9361
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2016-9361", "description": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating.", "id": "GSD-2016-9361" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-9361" ], "details": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating.", "id": "GSD-2016-9361", "modified": "2023-12-13T01:21:21.597624Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-9361", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa NPort", "version": { "version_data": [ { "version_value": "Moxa NPort" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Moxa NPort Device password retrieval" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85965" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.7", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.13", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-9361" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02", "refsource": "MISC", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2017-02-17T18:08Z", "publishedDate": "2017-02-13T21:59Z" } } }
fkie_cve-2016-9361
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8B36FF8-808A-4BFB-BF3E-C454449EC761", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D28B00-C0BD-4B70-B871-9D18F37DCBE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "747C55F4-D7CF-418B-BAFB-64CE71F4DD63", "versionEndIncluding": "3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5507650-F3BF-45AF-AA54-06CF3EAF7DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD7B68B-128D-4AB0-AE9E-A8B9329D67C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24577B4-5E3C-4727-8A50-EA3C33401636", "versionEndIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*", "matchCriteriaId": "18402F31-34ED-431B-A9D3-1EDC546B9381", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*", "matchCriteriaId": "A98BEE65-958C-45B0-915B-BEB39E356CBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*", "matchCriteriaId": "C40A47B2-55B7-43E3-9E01-34CB57D16267", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1D65E4-3836-41FC-9F06-A78D7D0AB2EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5834C0C2-0C1F-40AA-BBE8-1A01E10A43AD", "versionEndIncluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD9C3024-D682-4C4E-AF88-29F9FEA8AF12", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A398369-6E35-492C-9D85-6564B030E858", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF39890-7A93-43EA-964C-3AE5B747E0E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*", "matchCriteriaId": "38683F12-3FFD-4E9F-BDBF-6AD386A59091", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E747BEA-5087-4E3C-8DFF-EFFD84FE187F", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE28734-0DC6-4150-B282-E85FA86CD3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB85377-D610-40C0-9BAA-482A6F039D31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "649F9322-D82E-4C2D-944F-748C581BF1E4", "versionEndIncluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CF626E1-EC48-4D6B-9942-035122B9A887", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6B68C29-57E5-427A-AA83-D0A44E18E468", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*", "matchCriteriaId": "6947F0B7-12D9-47B7-BABD-3579D620EC4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76059B73-20B0-4BF5-BAD9-A1D00F9DACAD", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A659CBC-2A65-46AB-ACED-2C5EFC17BE71", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC23CCC6-A408-452A-96F2-046662551832", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*", "matchCriteriaId": "184129E6-9A9C-49BB-AE95-D0CEC1C5EBF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB976330-9062-48C3-9ED9-0B696CB778AC", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF26B8A9-FDC5-4634-B341-7C6F2E1BCBF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AF38EB9-EFE7-4A1B-94D7-5E5011FFBBA0", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B39317-D97B-4E9B-A6C3-B006B7A078F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*", "matchCriteriaId": "23518919-EAD2-43B9-91EB-946C044073F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED314ED8-2665-44F4-9FFF-940547392B6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8233CDC-98F0-46F3-AB55-DC7DEF9630AB", "versionEndIncluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "647275A0-6F25-4002-AE26-5F8397159FB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "0908C5BA-5568-4612-A96B-3869979FCB83", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9152230A-AC8C-4B43-99A9-6AF4C26CE4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E919D3F5-12E4-42F4-BE48-D426240BE2AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DCA3A9-CEF1-493F-89EB-B39275906E32", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1FDA9E-2D80-4407-94F6-6787EB605E37", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "479014A6-4878-4372-82F9-9274FC90F487", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "968A147A-9E5C-46E3-AE27-155EF7332D60", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C16DCC-6489-43D8-96BF-4F4D10561956", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "41216A7C-065A-4022-9ECD-35052C033C24", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D5BE975-D504-4F21-BC05-F5087F9BAD57", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD728AD5-D527-4A88-B80E-C278E9369AA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7383E19A-8524-4CF0-8E6A-D6598BFBBEBF", "versionEndIncluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADBF536-3320-4F38-BF68-CC69EEB07454", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B68B983-04C3-494A-9B1B-BB57A456E3FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DAE50DD-65CC-467E-878C-6EC68BF1743B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0D45D46-9160-43D3-9D94-407127CDC184", "versionEndIncluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "87373328-5B7A-49DE-B18C-A35433B05786", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "16561579-3023-4987-BA2D-510E7F702F95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating." }, { "lang": "es", "value": "Ha sido descubierto un problema en Moxa NPort 5110 versiones anteriores a 2.6, NPort 5130/5150 Series versiones anteriores a 3.6, NPort 5200 Series versiones anteriores a 2.8, NPort 5400 Series versiones anteriores a 3.11, NPort 5600 Series versiones anteriores a 3.7, NPort 5100A Series \u0026 NPort P5150A versiones anteriores a 1.3, NPort 5200A Series versiones anteriores a 1.3, NPort 5150AI-M12 Series versiones anteriores a 1.2, NPort 5250AI-M12 Series versiones anteriores a 1.2, NPort 5450AI-M12 Series versiones anteriores a 1.2, NPort 5600-8-DT Series versiones anteriores a 2.4, NPort 5600-8-DTL Series versiones anteriores a 2.4, NPort 6x50 Series versiones anteriores a 1.13.11, NPort IA5450A versiones anteriores a v1.4. Las contrase\u00f1as de administraci\u00f3n se pueden volver a intentar sin autenticar." } ], "id": "CVE-2016-9361", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-13T21:59:02.080", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-www3-95vv-vgx8
Vulnerability from github
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating.
{ "affected": [], "aliases": [ "CVE-2016-9361" ], "database_specific": { "cwe_ids": [ "CWE-287" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-02-13T21:59:00Z", "severity": "CRITICAL" }, "details": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating.", "id": "GHSA-www3-95vv-vgx8", "modified": "2022-05-17T02:58:45Z", "published": "2022-05-17T02:58:45Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9361" }, { "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/85965" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
var-201702-0860
Vulnerability from variot
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating. MOXANport is a serial communication server. MoxaNPort has a credential management vulnerability. An unauthenticated attacker exploits the vulnerability to obtain an administrator password. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. ##
This module requires Metasploit: https://metasploit.com/download
Current source: https://github.com/rapid7/metasploit-framework
class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Auxiliary::UDPScanner
def initialize(info = {}) super( update_info( info, 'Name' => 'Moxa UDP Device Discovery', 'Description' => %q( The Moxa protocol listens on 4800/UDP and will respond to broadcast or direct traffic. The service is known to be used on Moxa devices in the NPort, OnCell, and MGate product lines.
A discovery packet compels a Moxa device to respond to the sender
with some basic device information that is needed for more advanced
functions. The discovery data is 8 bytes in length and is the most
basic example of the Moxa protocol. It may be sent out as a
broadcast (destination 255.255.255.255) or to an individual device.
Devices that respond to this query may be vulnerable to serious
information disclosure vulnerabilities, such as CVE-2016-9361.
The module is the work of Patrick DeSantis of Cisco Talos and is
derived from original work by K. Reid Wightman. Tested and validated
on a Moxa NPort 6250 with firmware versions 1.13 and 1.15.
),
'Author' => 'Patrick DeSantis <p[at]t-r10t.com>',
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2016-9361'],
[ 'URL', 'https://www.digitalbond.com/blog/2016/10/25/serial-killers/'],
[ 'URL', 'http://www.moxa.com/support/faq/faq_detail.aspx?id=646' ],
]
)
)
register_options(
[
# Moxa protocol listens on 4800/UDP by default
Opt::RPORT(4800)
])
end
# The data to be sent via UDP def build_probe # Function Code (first byte) 0x01: Moxa discovery/identify # The fourth byte is the length of the full data payload @probe ||= "\x01\x00\x00\x08\x00\x00\x00\x00" end
# Called for each response packet def scanner_process(response, src_host, _src_port) # The first byte of a response will always be the func code + 0x80 # (the most significant bit of the byte is set to 1, so 0b00000001 # becomes 0b10000001, or 0x81). # A valid response is 24 bytes, starts with 0x81, and contains the values # 0x00, 0x90, 0xe8 (the Moxa OIU) in bytes 14, 15, and 16. return unless response[0] == "\x81" && response[14..16] == "\x00\x90\xe8" && response.length == 24 @results[src_host] ||= [] @results[src_host] << response end
# Called after the scan block def scanner_postscan(_batch) @results.each_pair do |host, response| peer = "#{host}:#{rport}"
# Report the host
report_host(
:host => host,
:info => "Moxa Device",
)
# Report the service
report_service(
host: host,
proto: 'udp',
port: rport,
name: 'Moxa Protocol',
)
if response.empty?
vprint_status("#{peer} No Moxa Devices Found.")
else
print_good("#{peer} Moxa Device Found!")
# Report vuln
report_vuln(
host: host,
port: rport,
proto: 'udp',
name: 'Moxa Protocol Use',
refs: references
)
end
end
end end
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0860", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nport 5200 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5600 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5400 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5x50a1-m12 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.1" }, { "model": "nport 6100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5200a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5100a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5400 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5410", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600-8-dtl series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5630", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650i-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5x50a1-m12 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5150a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5110\u003c2.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5130/5150\u003c3.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5200\u003c2.8" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5400\u003c3.11" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5600\u003c3.7" }, { "model": "nport p5150a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5100a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5200a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5150ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5250ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5450ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600-8-dt", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport 5600-8-dtl", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "6x50\u003c1.13.11" }, { "model": "nport ia5450a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.4" }, { "model": "nport 6100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5400 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5x50a1-m12 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.1" }, { "model": "nport p5150a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport ia5450a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "6x500" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "64501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "62501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61100" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "60000" }, { "model": "nport 5x50ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-dt/dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-8-dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "56000" }, { "model": "nport 5450ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "54000" }, { "model": "nport 5250ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5200a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "52000" }, { "model": "nport 5150ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51503.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51303.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51102.5" }, { "model": "nport 5100a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51000" }, { "model": "nport ia5450a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "6x501.14" }, { "model": "nport 5600-8-dtl", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5600-8-dt", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "56003.7" }, { "model": "nport 5450ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "54003.11" }, { "model": "nport 5250ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "52002.8" }, { "model": "nport 5150ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51503.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51303.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51102.6" }, { "model": "nport 5100a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:nport_5100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5100a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5400_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5410", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600-8-dtl_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5630", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650i-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5x50a1-m12_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_6100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_p5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_p5150a_series_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007639" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reid Wightman of Digital Bonds Labs", "sources": [ { "db": "BID", "id": "85965" }, { "db": "CNNVD", "id": "CNNVD-201612-030" } ], "trust": 0.9 }, "cve": "CVE-2016-9361", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-9361", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-11885", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-98181", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-9361", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-9361", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-9361", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2016-11885", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201612-030", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-98181", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-9361", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating. MOXANport is a serial communication server. MoxaNPort has a credential management vulnerability. An unauthenticated attacker exploits the vulnerability to obtain an administrator password. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. ##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule \u003c Msf::Auxiliary\n include Msf::Auxiliary::Report\n include Msf::Auxiliary::UDPScanner\n\n def initialize(info = {})\n super(\n update_info(\n info,\n \u0027Name\u0027 =\u003e \u0027Moxa UDP Device Discovery\u0027,\n \u0027Description\u0027 =\u003e %q(\n The Moxa protocol listens on 4800/UDP and will respond to broadcast\n or direct traffic. The service is known to be used on Moxa devices\n in the NPort, OnCell, and MGate product lines. \n\n A discovery packet compels a Moxa device to respond to the sender\n with some basic device information that is needed for more advanced\n functions. The discovery data is 8 bytes in length and is the most\n basic example of the Moxa protocol. It may be sent out as a\n broadcast (destination 255.255.255.255) or to an individual device. \n\n Devices that respond to this query may be vulnerable to serious\n information disclosure vulnerabilities, such as CVE-2016-9361. \n\n The module is the work of Patrick DeSantis of Cisco Talos and is\n derived from original work by K. Reid Wightman. Tested and validated\n on a Moxa NPort 6250 with firmware versions 1.13 and 1.15. \n ),\n \u0027Author\u0027 =\u003e \u0027Patrick DeSantis \u003cp[at]t-r10t.com\u003e\u0027,\n \u0027License\u0027 =\u003e MSF_LICENSE,\n \u0027References\u0027 =\u003e\n [\n [ \u0027CVE\u0027, \u00272016-9361\u0027],\n [ \u0027URL\u0027, \u0027https://www.digitalbond.com/blog/2016/10/25/serial-killers/\u0027],\n [ \u0027URL\u0027, \u0027http://www.moxa.com/support/faq/faq_detail.aspx?id=646\u0027 ],\n ]\n )\n )\n\n register_options(\n [\n # Moxa protocol listens on 4800/UDP by default\n Opt::RPORT(4800)\n ])\n end\n\n # The data to be sent via UDP\n def build_probe\n # Function Code (first byte) 0x01: Moxa discovery/identify\n # The fourth byte is the length of the full data payload\n @probe ||= \"\\x01\\x00\\x00\\x08\\x00\\x00\\x00\\x00\"\n end\n\n # Called for each response packet\n def scanner_process(response, src_host, _src_port)\n # The first byte of a response will always be the func code + 0x80\n # (the most significant bit of the byte is set to 1, so 0b00000001\n # becomes 0b10000001, or 0x81). \n # A valid response is 24 bytes, starts with 0x81, and contains the values\n # 0x00, 0x90, 0xe8 (the Moxa OIU) in bytes 14, 15, and 16. \n return unless response[0] == \"\\x81\" \u0026\u0026 response[14..16] == \"\\x00\\x90\\xe8\" \u0026\u0026 response.length == 24\n @results[src_host] ||= []\n @results[src_host] \u003c\u003c response\n end\n\n # Called after the scan block\n def scanner_postscan(_batch)\n @results.each_pair do |host, response|\n peer = \"#{host}:#{rport}\"\n\n # Report the host\n report_host(\n :host =\u003e host,\n :info =\u003e \"Moxa Device\",\n )\n\n # Report the service\n report_service(\n host: host,\n proto: \u0027udp\u0027,\n port: rport,\n name: \u0027Moxa Protocol\u0027,\n )\n\n if response.empty?\n vprint_status(\"#{peer} No Moxa Devices Found.\")\n else\n print_good(\"#{peer} Moxa Device Found!\")\n\n # Report vuln\n report_vuln(\n host: host,\n port: rport,\n proto: \u0027udp\u0027,\n name: \u0027Moxa Protocol Use\u0027,\n refs: references\n )\n end\n end\n end\nend\n", "sources": [ { "db": "NVD", "id": "CVE-2016-9361" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "BID", "id": "85965" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "PACKETSTORM", "id": "180949" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-9361", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-16-336-02", "trust": 3.5 }, { "db": "BID", "id": "85965", "trust": 2.1 }, { "db": "JVNDB", "id": "JVNDB-2016-007639", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-030", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11885", "trust": 0.6 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-16-099-01", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-98181", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-9361", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "180949", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "PACKETSTORM", "id": "180949" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "id": "VAR-201702-0860", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" } ], "trust": 1.592224151 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" } ] }, "last_update_date": "2024-11-23T21:54:17.013000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://japan.moxa.com/index.htm" }, { "title": "MoxaNPort Credential Management Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/84974" }, { "title": "Multiple Moxa Nport Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66082" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "CNNVD", "id": "CNNVD-201612-030" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-98181" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.5, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/85965" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9361" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9361" }, { "trust": 0.3, "url": "http://www.moxa.com/product/vport_sdk.htm" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/modules/auxiliary/scanner/scada/moxa_discover" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9361" }, { "trust": 0.1, "url": "https://github.com/rapid7/metasploit-framework" }, { "trust": 0.1, "url": "https://metasploit.com/download" }, { "trust": 0.1, "url": "https://www.digitalbond.com/blog/2016/10/25/serial-killers/\u0027]," }, { "trust": 0.1, "url": "http://www.moxa.com/support/faq/faq_detail.aspx?id=646\u0027" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "PACKETSTORM", "id": "180949" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "PACKETSTORM", "id": "180949" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2016-11885" }, { "date": "2017-02-13T00:00:00", "db": "VULHUB", "id": "VHN-98181" }, { "date": "2017-02-13T00:00:00", "db": "VULMON", "id": "CVE-2016-9361" }, { "date": "2016-04-08T00:00:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "date": "2024-08-31T23:16:47", "db": "PACKETSTORM", "id": "180949" }, { "date": "2016-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-030" }, { "date": "2017-02-13T21:59:02.080000", "db": "NVD", "id": "CVE-2016-9361" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-06T00:00:00", "db": "CNVD", "id": "CNVD-2016-11885" }, { "date": "2017-02-17T00:00:00", "db": "VULHUB", "id": "VHN-98181" }, { "date": "2017-02-17T00:00:00", "db": "VULMON", "id": "CVE-2016-9361" }, { "date": "2016-12-20T02:04:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "date": "2016-12-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-030" }, { "date": "2024-11-21T03:01:01.187000", "db": "NVD", "id": "CVE-2016-9361" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-030" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa NPort Vulnerability in product management passwords being retried without authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007639" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-030" } ], "trust": 0.6 } }
icsa-16-336-02a
Vulnerability from csaf_cisa
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-16-336-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2016/icsa-16-336-02a.json" }, { "category": "self", "summary": "ICS Advisory ICSA-16-336-02 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-16-336-02a" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" } ], "title": "Moxa NPort Device Vulnerabilities", "tracking": { "current_release_date": "2025-06-05T21:49:24.949030Z", "generator": { "date": "2025-06-05T21:49:24.948910Z", "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-16-336-02A", "initial_release_date": "2016-09-04T06:00:00.000000Z", "revision_history": [ { "date": "2016-09-04T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" }, { "date": "2025-06-05T21:49:24.949030Z", "legacy_version": "CSAF Conversion", "number": "2", "summary": "Advisory converted into a CSAF" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.7", "product": { "name": "Moxa NPort 5110: \u003c2.7", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "NPort 5110" }, { "branches": [ { "category": "product_version_range", "name": "\u003c3.7", "product": { "name": "Moxa NPort 5130/5150 Series: \u003c3.7", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "NPort 5130/5150 Series" }, { "branches": [ { "category": "product_version_range", "name": "\u003c2.9", "product": { "name": "Moxa NPort 5200 Series: \u003c2.9", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "NPort 5200 Series" }, { "branches": [ { "category": "product_version_range", "name": "\u003c3.12", "product": { "name": "Moxa NPort 5400 Series: \u003c3.12", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "NPort 5400 Series" }, { "branches": [ { "category": "product_version_range", "name": "\u003c3.8", "product": { "name": "Moxa NPort 5600 Series: \u003c3.8", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "NPort 5600 Series" }, { "branches": [ { "category": "product_version_range", "name": "\u003c1.4", "product": { "name": "Moxa NPort 5100A Series: \u003c1.4", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "NPort 5100A Series" }, { "branches": [ { "category": "product_version_range", "name": "\u003c1.4", "product": { "name": "Moxa NPort P5150A: \u003c1.4", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "NPort P5150A" }, { "branches": [ { "category": "product_version_range", "name": "\u003c1.4", "product": { "name": "Moxa NPort 5200A Series: \u003c1.4", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "NPort 5200A Series" }, { "branches": [ { "category": "product_version_range", "name": "\u003c1.3", "product": { "name": "Moxa NPort 5150AI-M12 Series: \u003c1.3", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "NPort 5150AI-M12 Series" }, { "branches": [ { "category": "product_version_range", "name": "\u003c1.3", "product": { "name": "Moxa NPort 5250AI-M12 Series: \u003c1.3", "product_id": "CSAFPID-0010" } } ], "category": "product_name", "name": "NPort 5250AI-M12 Series" }, { "branches": [ { "category": "product_version_range", "name": "\u003c1.3", "product": { "name": "Moxa NPort 5450AI-M12 Series: \u003c1.3", "product_id": "CSAFPID-0011" } } ], "category": "product_name", "name": "NPort 5450AI-M12 Series" }, { "branches": [ { "category": "product_version_range", "name": "\u003c2.5", "product": { "name": "Moxa NPort 5600-8-DT Series: \u003c2.5", "product_id": "CSAFPID-0012" } } ], "category": "product_name", "name": "NPort 5600-8-DT Series" }, { "branches": [ { "category": "product_version_range", "name": "\u003c2.5", "product": { "name": "Moxa NPort 5600-8-DTL Series: \u003c2.5", "product_id": "CSAFPID-0013" } } ], "category": "product_name", "name": "NPort 5600-8-DTL Series" }, { "branches": [ { "category": "product_version_range", "name": "\u003cv1.4", "product": { "name": "Moxa NPort IA5450A: \u003cv1.4", "product_id": "CSAFPID-0014" } } ], "category": "product_name", "name": "NPort IA5450A" }, { "branches": [ { "category": "product_version_range", "name": "\u003c1.16", "product": { "name": "Moxa NPort 6000 series: \u003c1.16", "product_id": "CSAFPID-0015" } } ], "category": "product_name", "name": "NPort 6000 series" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "Moxa NPort 6110 series: vers:all/*", "product_id": "CSAFPID-0016" } } ], "category": "product_name", "name": "NPort 6110 series" } ], "category": "vendor", "name": "Moxa" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-9363", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Buffer overflow vulnerability may allow an unauthenticated attacker to remotely execute arbitrary code.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, "remediations": [ { "category": "mitigation", "details": "Moxa has released new firmware versions, which address the identified vulnerabilities in all but one of the affected NPort devices. Moxa recommends installing the new firmware version.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, { "category": "mitigation", "details": "NPort 5110 Version 2.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=882)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=882" }, { "category": "mitigation", "details": "NPort 5130/5150 Series Version 3.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=356)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=356" }, { "category": "mitigation", "details": "NPort 5200 Series Version 2.9: (http://www.moxa.com/support/download.aspx?type=support\u0026id=904)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=904" }, { "category": "mitigation", "details": "NPort 5400 Series Version 3.12: (http://www.moxa.com/support/download.aspx?type=support\u0026id=925)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=925" }, { "category": "mitigation", "details": "NPort 5600 Series Version 3.8: (http://www.moxa.com/support/download.aspx?type=support\u0026id=905)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=905" }, { "category": "mitigation", "details": "NPort 5100A Series \u0026 NPort P5150A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1403)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1403" }, { "category": "mitigation", "details": "NPort 5200A Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1462)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1462" }, { "category": "mitigation", "details": "NPort 5150AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2206)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2206" }, { "category": "mitigation", "details": "NPort 5250AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2207)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2207" }, { "category": "mitigation", "details": "NPort 5450AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2208)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2208" }, { "category": "mitigation", "details": "NPort 5600-8-DT Series Version 2.5: (http://www.moxa.com/support/download.aspx?type=support\u0026id=938)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=938" }, { "category": "mitigation", "details": "NPort 5600-8-DTL Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1819)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1819" }, { "category": "mitigation", "details": "NPort IA5450A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1469)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1469" }, { "category": "mitigation", "details": "NPort 6000 Series Version 1.16: (http://www.moxa.com/support/download.aspx?type=support\u0026id=733)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=733" }, { "category": "mitigation", "details": "Moxa has reported that the NPort 6110 device was discontinued in December 2008 and will not have patches released to address these vulnerabilities. Moxa recommends that customers using the NPort 6110 should upgrade the affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ] }, { "cve": "CVE-2016-9361", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, "remediations": [ { "category": "mitigation", "details": "Moxa has released new firmware versions, which address the identified vulnerabilities in all but one of the affected NPort devices. Moxa recommends installing the new firmware version.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, { "category": "mitigation", "details": "NPort 5110 Version 2.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=882)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=882" }, { "category": "mitigation", "details": "NPort 5130/5150 Series Version 3.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=356)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=356" }, { "category": "mitigation", "details": "NPort 5200 Series Version 2.9: (http://www.moxa.com/support/download.aspx?type=support\u0026id=904)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=904" }, { "category": "mitigation", "details": "NPort 5400 Series Version 3.12: (http://www.moxa.com/support/download.aspx?type=support\u0026id=925)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=925" }, { "category": "mitigation", "details": "NPort 5600 Series Version 3.8: (http://www.moxa.com/support/download.aspx?type=support\u0026id=905)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=905" }, { "category": "mitigation", "details": "NPort 5100A Series \u0026 NPort P5150A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1403)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1403" }, { "category": "mitigation", "details": "NPort 5200A Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1462)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1462" }, { "category": "mitigation", "details": "NPort 5150AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2206)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2206" }, { "category": "mitigation", "details": "NPort 5250AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2207)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2207" }, { "category": "mitigation", "details": "NPort 5450AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2208)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2208" }, { "category": "mitigation", "details": "NPort 5600-8-DT Series Version 2.5: (http://www.moxa.com/support/download.aspx?type=support\u0026id=938)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=938" }, { "category": "mitigation", "details": "NPort 5600-8-DTL Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1819)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1819" }, { "category": "mitigation", "details": "NPort IA5450A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1469)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1469" }, { "category": "mitigation", "details": "NPort 6000 Series Version 1.16: (http://www.moxa.com/support/download.aspx?type=support\u0026id=733)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=733" }, { "category": "mitigation", "details": "Moxa has reported that the NPort 6110 device was discontinued in December 2008 and will not have patches released to address these vulnerabilities. Moxa recommends that customers using the NPort 6110 should upgrade the affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ] }, { "cve": "CVE-2016-9348", "cwe": { "id": "CWE-256", "name": "Plaintext Storage of a Password" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. A configuration file contains parameters that represent passwords in plaintext.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, "remediations": [ { "category": "mitigation", "details": "Moxa has released new firmware versions, which address the identified vulnerabilities in all but one of the affected NPort devices. Moxa recommends installing the new firmware version.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, { "category": "mitigation", "details": "NPort 5110 Version 2.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=882)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=882" }, { "category": "mitigation", "details": "NPort 5130/5150 Series Version 3.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=356)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=356" }, { "category": "mitigation", "details": "NPort 5200 Series Version 2.9: (http://www.moxa.com/support/download.aspx?type=support\u0026id=904)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=904" }, { "category": "mitigation", "details": "NPort 5400 Series Version 3.12: (http://www.moxa.com/support/download.aspx?type=support\u0026id=925)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=925" }, { "category": "mitigation", "details": "NPort 5600 Series Version 3.8: (http://www.moxa.com/support/download.aspx?type=support\u0026id=905)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=905" }, { "category": "mitigation", "details": "NPort 5100A Series \u0026 NPort P5150A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1403)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1403" }, { "category": "mitigation", "details": "NPort 5200A Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1462)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1462" }, { "category": "mitigation", "details": "NPort 5150AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2206)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2206" }, { "category": "mitigation", "details": "NPort 5250AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2207)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2207" }, { "category": "mitigation", "details": "NPort 5450AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2208)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2208" }, { "category": "mitigation", "details": "NPort 5600-8-DT Series Version 2.5: (http://www.moxa.com/support/download.aspx?type=support\u0026id=938)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=938" }, { "category": "mitigation", "details": "NPort 5600-8-DTL Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1819)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1819" }, { "category": "mitigation", "details": "NPort IA5450A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1469)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1469" }, { "category": "mitigation", "details": "NPort 6000 Series Version 1.16: (http://www.moxa.com/support/download.aspx?type=support\u0026id=733)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=733" }, { "category": "mitigation", "details": "Moxa has reported that the NPort 6110 device was discontinued in December 2008 and will not have patches released to address these vulnerabilities. Moxa recommends that customers using the NPort 6110 should upgrade the affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ] }, { "cve": "CVE-2016-9369", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, "remediations": [ { "category": "mitigation", "details": "Moxa has released new firmware versions, which address the identified vulnerabilities in all but one of the affected NPort devices. Moxa recommends installing the new firmware version.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, { "category": "mitigation", "details": "NPort 5110 Version 2.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=882)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=882" }, { "category": "mitigation", "details": "NPort 5130/5150 Series Version 3.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=356)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=356" }, { "category": "mitigation", "details": "NPort 5200 Series Version 2.9: (http://www.moxa.com/support/download.aspx?type=support\u0026id=904)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=904" }, { "category": "mitigation", "details": "NPort 5400 Series Version 3.12: (http://www.moxa.com/support/download.aspx?type=support\u0026id=925)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=925" }, { "category": "mitigation", "details": "NPort 5600 Series Version 3.8: (http://www.moxa.com/support/download.aspx?type=support\u0026id=905)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=905" }, { "category": "mitigation", "details": "NPort 5100A Series \u0026 NPort P5150A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1403)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1403" }, { "category": "mitigation", "details": "NPort 5200A Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1462)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1462" }, { "category": "mitigation", "details": "NPort 5150AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2206)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2206" }, { "category": "mitigation", "details": "NPort 5250AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2207)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2207" }, { "category": "mitigation", "details": "NPort 5450AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2208)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2208" }, { "category": "mitigation", "details": "NPort 5600-8-DT Series Version 2.5: (http://www.moxa.com/support/download.aspx?type=support\u0026id=938)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=938" }, { "category": "mitigation", "details": "NPort 5600-8-DTL Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1819)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1819" }, { "category": "mitigation", "details": "NPort IA5450A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1469)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1469" }, { "category": "mitigation", "details": "NPort 6000 Series Version 1.16: (http://www.moxa.com/support/download.aspx?type=support\u0026id=733)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=733" }, { "category": "mitigation", "details": "Moxa has reported that the NPort 6110 device was discontinued in December 2008 and will not have patches released to address these vulnerabilities. Moxa recommends that customers using the NPort 6110 should upgrade the affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ] }, { "cve": "CVE-2016-9366", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, "remediations": [ { "category": "mitigation", "details": "Moxa has released new firmware versions, which address the identified vulnerabilities in all but one of the affected NPort devices. Moxa recommends installing the new firmware version.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, { "category": "mitigation", "details": "NPort 5110 Version 2.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=882)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=882" }, { "category": "mitigation", "details": "NPort 5130/5150 Series Version 3.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=356)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=356" }, { "category": "mitigation", "details": "NPort 5200 Series Version 2.9: (http://www.moxa.com/support/download.aspx?type=support\u0026id=904)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=904" }, { "category": "mitigation", "details": "NPort 5400 Series Version 3.12: (http://www.moxa.com/support/download.aspx?type=support\u0026id=925)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=925" }, { "category": "mitigation", "details": "NPort 5600 Series Version 3.8: (http://www.moxa.com/support/download.aspx?type=support\u0026id=905)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=905" }, { "category": "mitigation", "details": "NPort 5100A Series \u0026 NPort P5150A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1403)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1403" }, { "category": "mitigation", "details": "NPort 5200A Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1462)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1462" }, { "category": "mitigation", "details": "NPort 5150AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2206)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2206" }, { "category": "mitigation", "details": "NPort 5250AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2207)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2207" }, { "category": "mitigation", "details": "NPort 5450AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2208)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2208" }, { "category": "mitigation", "details": "NPort 5600-8-DT Series Version 2.5: (http://www.moxa.com/support/download.aspx?type=support\u0026id=938)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=938" }, { "category": "mitigation", "details": "NPort 5600-8-DTL Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1819)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1819" }, { "category": "mitigation", "details": "NPort IA5450A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1469)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1469" }, { "category": "mitigation", "details": "NPort 6000 Series Version 1.16: (http://www.moxa.com/support/download.aspx?type=support\u0026id=733)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=733" }, { "category": "mitigation", "details": "Moxa has reported that the NPort 6110 device was discontinued in December 2008 and will not have patches released to address these vulnerabilities. Moxa recommends that customers using the NPort 6110 should upgrade the affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ] }, { "cve": "CVE-2016-9365", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Requests are not verified to be intentionally submitted by the proper user (CROSS-SITE REQUEST FORGERY).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, "remediations": [ { "category": "mitigation", "details": "Moxa has released new firmware versions, which address the identified vulnerabilities in all but one of the affected NPort devices. Moxa recommends installing the new firmware version.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, { "category": "mitigation", "details": "NPort 5110 Version 2.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=882)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=882" }, { "category": "mitigation", "details": "NPort 5130/5150 Series Version 3.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=356)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=356" }, { "category": "mitigation", "details": "NPort 5200 Series Version 2.9: (http://www.moxa.com/support/download.aspx?type=support\u0026id=904)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=904" }, { "category": "mitigation", "details": "NPort 5400 Series Version 3.12: (http://www.moxa.com/support/download.aspx?type=support\u0026id=925)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=925" }, { "category": "mitigation", "details": "NPort 5600 Series Version 3.8: (http://www.moxa.com/support/download.aspx?type=support\u0026id=905)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=905" }, { "category": "mitigation", "details": "NPort 5100A Series \u0026 NPort P5150A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1403)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1403" }, { "category": "mitigation", "details": "NPort 5200A Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1462)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1462" }, { "category": "mitigation", "details": "NPort 5150AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2206)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2206" }, { "category": "mitigation", "details": "NPort 5250AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2207)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2207" }, { "category": "mitigation", "details": "NPort 5450AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2208)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2208" }, { "category": "mitigation", "details": "NPort 5600-8-DT Series Version 2.5: (http://www.moxa.com/support/download.aspx?type=support\u0026id=938)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=938" }, { "category": "mitigation", "details": "NPort 5600-8-DTL Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1819)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1819" }, { "category": "mitigation", "details": "NPort IA5450A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1469)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1469" }, { "category": "mitigation", "details": "NPort 6000 Series Version 1.16: (http://www.moxa.com/support/download.aspx?type=support\u0026id=733)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=733" }, { "category": "mitigation", "details": "Moxa has reported that the NPort 6110 device was discontinued in December 2008 and will not have patches released to address these vulnerabilities. Moxa recommends that customers using the NPort 6110 should upgrade the affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ] }, { "cve": "CVE-2016-9367", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. The amount of resources requested by a malicious actor is not restricted, leading to a denial-of-service caused by resource exhaustion.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, "remediations": [ { "category": "mitigation", "details": "Moxa has released new firmware versions, which address the identified vulnerabilities in all but one of the affected NPort devices. Moxa recommends installing the new firmware version.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, { "category": "mitigation", "details": "NPort 5110 Version 2.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=882)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=882" }, { "category": "mitigation", "details": "NPort 5130/5150 Series Version 3.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=356)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=356" }, { "category": "mitigation", "details": "NPort 5200 Series Version 2.9: (http://www.moxa.com/support/download.aspx?type=support\u0026id=904)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=904" }, { "category": "mitigation", "details": "NPort 5400 Series Version 3.12: (http://www.moxa.com/support/download.aspx?type=support\u0026id=925)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=925" }, { "category": "mitigation", "details": "NPort 5600 Series Version 3.8: (http://www.moxa.com/support/download.aspx?type=support\u0026id=905)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=905" }, { "category": "mitigation", "details": "NPort 5100A Series \u0026 NPort P5150A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1403)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1403" }, { "category": "mitigation", "details": "NPort 5200A Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1462)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1462" }, { "category": "mitigation", "details": "NPort 5150AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2206)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2206" }, { "category": "mitigation", "details": "NPort 5250AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2207)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2207" }, { "category": "mitigation", "details": "NPort 5450AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2208)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2208" }, { "category": "mitigation", "details": "NPort 5600-8-DT Series Version 2.5: (http://www.moxa.com/support/download.aspx?type=support\u0026id=938)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=938" }, { "category": "mitigation", "details": "NPort 5600-8-DTL Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1819)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1819" }, { "category": "mitigation", "details": "NPort IA5450A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1469)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1469" }, { "category": "mitigation", "details": "NPort 6000 Series Version 1.16: (http://www.moxa.com/support/download.aspx?type=support\u0026id=733)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=733" }, { "category": "mitigation", "details": "Moxa has reported that the NPort 6110 device was discontinued in December 2008 and will not have patches released to address these vulnerabilities. Moxa recommends that customers using the NPort 6110 should upgrade the affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ] }, { "cve": "CVE-2016-9371", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, "remediations": [ { "category": "mitigation", "details": "Moxa has released new firmware versions, which address the identified vulnerabilities in all but one of the affected NPort devices. Moxa recommends installing the new firmware version.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] }, { "category": "mitigation", "details": "NPort 5110 Version 2.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=882)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=882" }, { "category": "mitigation", "details": "NPort 5130/5150 Series Version 3.7: (http://www.moxa.com/support/download.aspx?type=support\u0026id=356)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=356" }, { "category": "mitigation", "details": "NPort 5200 Series Version 2.9: (http://www.moxa.com/support/download.aspx?type=support\u0026id=904)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=904" }, { "category": "mitigation", "details": "NPort 5400 Series Version 3.12: (http://www.moxa.com/support/download.aspx?type=support\u0026id=925)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=925" }, { "category": "mitigation", "details": "NPort 5600 Series Version 3.8: (http://www.moxa.com/support/download.aspx?type=support\u0026id=905)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=905" }, { "category": "mitigation", "details": "NPort 5100A Series \u0026 NPort P5150A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1403)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1403" }, { "category": "mitigation", "details": "NPort 5200A Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1462)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1462" }, { "category": "mitigation", "details": "NPort 5150AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2206)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2206" }, { "category": "mitigation", "details": "NPort 5250AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2207)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2207" }, { "category": "mitigation", "details": "NPort 5450AI-M12 Series Version 1.3: (http://www.moxa.com/support/download.aspx?type=support\u0026id=2208)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=2208" }, { "category": "mitigation", "details": "NPort 5600-8-DT Series Version 2.5: (http://www.moxa.com/support/download.aspx?type=support\u0026id=938)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=938" }, { "category": "mitigation", "details": "NPort 5600-8-DTL Series Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1819)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1819" }, { "category": "mitigation", "details": "NPort IA5450A Version 1.4: (http://www.moxa.com/support/download.aspx?type=support\u0026id=1469)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=1469" }, { "category": "mitigation", "details": "NPort 6000 Series Version 1.16: (http://www.moxa.com/support/download.aspx?type=support\u0026id=733)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ], "url": "http://www.moxa.com/support/download.aspx?type=support\u0026id=733" }, { "category": "mitigation", "details": "Moxa has reported that the NPort 6110 device was discontinued in December 2008 and will not have patches released to address these vulnerabilities. Moxa recommends that customers using the NPort 6110 should upgrade the affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0016" ] } ] } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.