CVE-2020-6987 (GCVE-0-2020-6987)
Vulnerability from cvelistv5
Published
2020-03-24 19:00
Modified
2024-08-04 09:18
Severity ?
CWE
  • CWE-327 - USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM
Summary
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed.
References
Impacted products
Vendor Product Version
n/a Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower Version: Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T09:18:02.493Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-327",
              "description": "USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-24T19:00:16",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2020-6987",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03",
              "refsource": "MISC",
              "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2020-6987",
    "datePublished": "2020-03-24T19:00:16",
    "dateReserved": "2020-01-14T00:00:00",
    "dateUpdated": "2024-08-04T09:18:02.493Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-6987\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2020-03-24T19:15:21.337\",\"lastModified\":\"2024-11-21T05:36:26.417\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed.\"},{\"lang\":\"es\",\"value\":\"En Moxa la serie PT-7528 firmware, versiones 4.0 o inferiores y la serie PT-7828 firmware, versiones 3.9 o inferiores, los productos afectados utilizan un algoritmo criptogr\u00e1fico d\u00e9bil, que puede permitir una divulgaci\u00f3n de informaci\u00f3n confidencial.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-327\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-327\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-24tx-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"23172D9F-8C29-436C-8D1D-C6C69A7D544B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-24tx-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A8DA48C-AC0C-4134-96E5-58D1DE15E83F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-24tx-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"87870519-31E2-438F-9E4B-80C1E960BAA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-24tx-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4161EA3-F10A-4311-9C91-A19CFD97B6E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-24tx-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"9662C706-550D-4A2A-B811-46FC67D4ECD8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-24tx-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB152B69-992F-4C89-A5C5-00F67E19BC9B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-24tx-wv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"9E2ECB8C-6E44-4884-A543-92B3FADBF913\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-24tx-wv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"941BB098-D358-4F8C-BCD6-0AE9E1F9B515\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-24tx-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"8350B35C-F6AD-49ED-B165-A318EFCF9057\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-24tx-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B4B95C-7D87-4F5A-9499-97FBA99A93FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"598CFEF6-EDE3-4446-BF7B-459E2AC51D43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CFBC387-D664-4789-B3F7-7B87667963EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"F4B85577-5789-49D4-8F55-E9674BFAADE8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C532A7-AFC5-4F8B-9FCA-365DE8CAAD41\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"20CF217C-21DD-4181-9489-B59168E48B69\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"310FA2C6-C219-4C22-BABD-8CD3B4DBA20A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"7E30F784-5FC1-4F9B-8E87-939028052B9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B10C85C-B21A-427F-B8DA-5D7EB00382F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"DAF33C5F-51BA-433F-96F5-C56DA78DA78E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB085777-7FC8-4FC5-869C-9DF351B16799\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"D0A1D658-9F40-4D0D-A243-EF91342224DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAEA10F5-9E52-4658-851A-7ABDD4135E90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"1B21B040-6F79-4845-8A57-51361637401D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33B5BB02-8C2F-4E98-BB60-E5F261681C19\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"63B66690-697D-4DD0-A7FF-83185174E8EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47AA88D4-4BCF-43C4-BDD3-2F8C8E596046\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"1FBF1C1B-3DA2-4EE4-A36B-83C5B84232E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0414660-74EF-49F0-9DBA-0305B835D408\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"46683121-C8D6-40C9-86F0-A3F44977BD71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4DD3C6-78B5-4458-B487-63D37027CF99\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"3CF72041-8378-497F-86EF-E7AE3B7A855C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C16033-43B1-41C0-87E7-4ABEB1EA6761\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"76DF7328-037B-4D75-BFF1-D22FE32D1F9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"674D3631-53DF-4E98-BC1E-C4122DF3F26A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"A376430A-4F8E-4B91-83E4-C9D14A601C2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB472079-8ECF-44E2-969E-4FB5CF0E3971\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"055969EC-1F60-4F95-B686-535A71F5F496\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A7A8554-54A1-4B4C-A583-90FC0EC49A11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"379BD1B2-68D5-4BB2-A816-DCB69183267D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E4FE31-0EC0-4034-8099-BCEC33E421ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"A249EAAC-7B5C-4ADA-A5D1-E612D2F580F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6431F64E-9899-4F01-8814-1A92A36353C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"41C54026-899E-4D3C-8ECD-B9D1C6751B26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D937271E-9E14-446A-B5DD-7B1E6D2B5C9C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"0783C349-5E13-4B8E-BE92-DFB18DE31643\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CE86A9B-1C3F-4208-A238-3E70031D3856\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"567BC006-28FB-44F2-A779-B4B8320F3A3B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D9E901-A046-4CC2-A3E5-42E42EA3308C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"8C377E2E-43F1-4CDA-9386-074374EFD71C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABF64C98-AF29-4C56-9E21-081E5DBE0B79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"83852BAA-F68C-4273-B822-25280EBE3D00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F676041D-CF87-403D-9911-5B6DA9B21CC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"0B07BFA5-350C-401A-B063-B0322157784C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECF8194D-BAA0-4F1F-AAC3-C5B96E4D0368\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"42E2DDC4-5EEE-459D-AAB4-18AC1573C5F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C73920-8D86-4511-981D-944AD53965D2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"4F8503F5-454C-4EB9-86DC-853CB7D3BF9C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65AAE0BE-B955-428C-8DB3-EDC69D513B0A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"86246FAC-8D36-41FE-85EC-9362D938A85B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CCCFD34-9E11-4F33-AE7B-4F20F7B3A1C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"0F63B515-D60A-41C8-AD93-DBCE2440E6AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F36333F5-C4F5-4BB2-940C-88D9F886D398\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"F703C1A8-E64A-4486-9F1A-11D0FF4EC5CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEA388CA-199C-487F-82F0-752FFA204286\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"6E7BA6AA-9EE5-46A8-AC4C-466A87159D95\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"145A2735-5820-4060-80A0-51F3D7CABCCE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"DB462B54-F23B-4939-B9DF-2DFDE242C322\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E6D37D-CD68-4E62-97BA-B6E87565C04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"2896256B-54D6-45EC-9F23-9D27ABD04FBD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64A930B4-B043-4AF9-95E4-562AB65A9CDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"86638803-6014-4DE7-BBC9-26F2137368FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B29B0F1-0575-4EFF-9A45-6E86526A2C19\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"C202168C-3666-4726-93A4-8AA0F910B322\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6711A4E5-F1D8-4C4E-BD2A-52FB66F670F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"4B0F7D65-7F08-4AFA-A30A-E29DCDFD49A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75ADE518-83D1-4275-8E55-5412238EFC86\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"5DD1476B-B648-4EB7-A233-75FFDC4FCF1E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C689B536-4889-4BA1-AB29-ACE7C5DC952D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-24_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"FADBEE27-6C34-4F1C-B1FF-FC90263D3CB8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91F7180-8FC6-4A74-B59E-D11E9AC529A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-24-24_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"748065CA-4349-48DC-96D9-0FB05F3BF098\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-24-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69EEDC14-3565-4808-9EC5-F27B201D48B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-24-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"2E768FF9-FAEB-44D1-95E5-8A416C934371\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-24-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEADBFB7-64EB-4E1B-86DB-364E2F0111D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-48_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"4E4C480A-5367-46C1-85A5-E3210E0C670A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17BF3C14-D5BE-4369-867E-7DEE972FEC97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-48-48_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"749457D9-5269-43C3-A6A2-F1DF27D87F1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-48-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ABB933B-A0CB-431E-A51D-EB630BFE92D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-48-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"D9A526F2-8568-4088-87AF-B63D5063594B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-48-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29F68ADA-AE16-4FFC-9374-2AFFBCCFBF57\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"3695DC89-A027-49A6-A39E-77BDAE7A424E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F572FA7-7520-4F5F-8398-42B3788C8B8A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"CD226E1F-DAE6-47B5-B5F3-46FAE2B7C2FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9B389AF-83A2-4A35-96BE-7971B1B3E4FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-24_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"238EAECC-E3A2-426B-9A5A-9F48D985B322\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08EF9BFC-B45B-4F5E-8745-B335EFE638A5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-24-24_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"A07EA3C4-2722-43B4-9AD7-EFCD92BDCED8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-24-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F88B615C-BE6A-4B1C-95A7-5B37796159C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-24-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"5058559A-1141-4B2C-AD06-58DD3E590C56\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-24-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D507239-F351-4DA0-80D0-96ACB9419EC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-48_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"9018404B-910F-4247-AB18-CA644A052FEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91198EE7-4205-478E-B7A8-987F977AD82C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-48-48_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"189D5ACC-D0F2-428B-A90C-2FA39D6D6C20\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-48-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02DA7C0A-2F37-461D-AFA8-BF73C653F47E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-48-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"41D304A9-E038-44F4-A139-896A51DB25A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-48-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EA7D60F-4670-4AAE-8A31-89C60A38EA43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"33B8C349-4B07-4172-A629-4C0FBDE943A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392DB5FC-65AA-4E08-8E9F-AA66F6135078\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"E8F1E348-4C0F-420B-9275-2D5257D6E8BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC4F8DC4-26C0-4D82-A7B6-8285158A1F21\"}]}]}],\"references\":[{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-20-056-03\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-20-056-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…