CVE-2022-3088 (GCVE-0-2022-3088)
Vulnerability from cvelistv5
Published
2022-11-22 00:00
Modified
2025-04-16 17:42
CWE
  • CWE-250 - Execution with Unnecessary Privileges
Summary
UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12, UC-3100 System Image: Versions v1.0 to v1.6, UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa's ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:00:10.008Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-3088",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-16T17:25:51.797778Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-16T17:42:25.272Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "UC-8100A-ME-T System Imaage",
          "vendor": "Moxa",
          "versions": [
            {
              "lessThanOrEqual": "1.6",
              "status": "affected",
              "version": "1.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "UC-2100 System Image",
          "vendor": "Moxa",
          "versions": [
            {
              "lessThanOrEqual": "1.12",
              "status": "affected",
              "version": "1.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "UC-2100-W System Image",
          "vendor": "Moxa",
          "versions": [
            {
              "lessThanOrEqual": "1.12",
              "status": "affected",
              "version": "1.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "UC-3100 System Image",
          "vendor": "Moxa",
          "versions": [
            {
              "lessThanOrEqual": "1.6",
              "status": "affected",
              "version": "1.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "UC-5100 System Image",
          "vendor": "Moxa",
          "versions": [
            {
              "lessThanOrEqual": "1.4",
              "status": "affected",
              "version": "1.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "UC-8100 System Image",
          "vendor": "Moxa",
          "versions": [
            {
              "lessThanOrEqual": "3.5",
              "status": "affected",
              "version": "3.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "UC-8100-ME-T System Image",
          "vendor": "Moxa",
          "versions": [
            {
              "lessThanOrEqual": "3.1",
              "status": "affected",
              "version": "3.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "UC-8200 System Image",
          "vendor": "Moxa",
          "versions": [
            {
              "lessThanOrEqual": "1.5",
              "status": "affected",
              "version": "1.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "AIG-300 System Image",
          "vendor": "Moxa",
          "versions": [
            {
              "lessThanOrEqual": "1.4",
              "status": "affected",
              "version": "1.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "UC-8410A with Debian 9 System Image",
          "vendor": "Moxa",
          "versions": [
            {
              "status": "affected",
              "version": "4.0.2 and 4.1.2"
            }
          ]
        },
        {
          "product": "UC-8580 with Debian 9 System Image",
          "vendor": "Moxa",
          "versions": [
            {
              "status": "affected",
              "version": "2.0 and 2.1"
            }
          ]
        },
        {
          "product": "UC-8540 with Debian 9 System Image",
          "vendor": "Moxa",
          "versions": [
            {
              "status": "affected",
              "version": "2.0 and 2.1"
            }
          ]
        },
        {
          "product": "DA-662C-16-LX (GLB) System Image",
          "vendor": "Moxa",
          "versions": [
            {
              "lessThanOrEqual": "1.1.2",
              "status": "affected",
              "version": "1.0.2",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "En Garde ICSRange research team reported this vulnerability to CISA. "
        }
      ],
      "datePublic": "2022-11-22T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12,\u0026nbsp;UC-3100 System Image: Versions v1.0 to v1.6,\u0026nbsp;UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa\u0027s ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-250",
              "description": "CWE-250 Execution with Unnecessary Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-12-07T00:00:00.000Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Moxa developed updates to address this vulnerability. Users should follow the instructions in Moxa\u0027s security advisory to update their system image.  "
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2022-3088",
    "datePublished": "2022-11-22T00:00:00.000Z",
    "dateReserved": "2022-09-01T00:00:00.000Z",
    "dateUpdated": "2025-04-16T17:42:25.272Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-3088\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2022-11-28T22:15:10.783\",\"lastModified\":\"2024-11-21T07:18:47.987\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12,\u0026nbsp;UC-3100 System Image: Versions v1.0 to v1.6,\u0026nbsp;UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa\u0027s ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges.\"},{\"lang\":\"es\",\"value\":\"System Image UC-8100A-ME-T: Versiones v1.0 a v1.6, \\nSystem Image UC-2100: Versiones v1.0 a v1.12, \\nSystem Image UC-2100-W: Versiones v1.0 a v 1.12, \\nSystem Image UC-3100: versiones v1.0 a v1.6, \\nSystem Image UC-5100: versiones v1.0 a v1.4, \\nSystem Image UC-8100: versiones v3.0 a v3.5, \\nSystem Image UC-8100-ME-T: Versiones v3.0 y v3.1, \\nSystem Image UC-8200: v1.0 a v1.5,\\nSystem Image AIG-300: v1.0 a v1.4, \\nSystem Image UC-8410A con Debian 9: Versiones v4.0.2 y v4.1.2, \\nSystem Image UC-8580 con Debian 9: Versiones v2.0 y v2.1, \\nSystem Image UC-8540 con Debian 9: Versiones v2.0 y v2.1, y \\nSystem Image DA -662C-16-LX (GLB): Las versiones v1.0.2 a v1.1.2 \\nLas m\u00e1quinas basadas en ARM de Moxa tienen una vulnerabilidad de ejecuci\u00f3n con privilegios innecesarios, lo que podr\u00eda permitir que un atacante con privilegios de nivel de usuario obtenga privilegios de root.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-250\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-2101-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.12\",\"matchCriteriaId\":\"82A95780-DA57-4CF4-BCD8-9298BDDD705D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-2101-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA09978A-2E63-4E29-A693-F0361951FCFF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-2102-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.2\",\"matchCriteriaId\":\"35B8CD12-EE1E-47D9-9780-D25DDA1B8AE1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-2102-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"053D848E-1BB1-4B91-A205-84F83FE57E8F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-2104-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.2\",\"matchCriteriaId\":\"DA658647-BCC7-44F8-AFC2-1511FB5B229C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-2104-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7C374EE-E4C8-469F-BC45-E43F739D3D23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-2111-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.2\",\"matchCriteriaId\":\"D5064B21-4C23-41B0-A367-673ACEF43ED8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-2111-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F85BA8C3-A65F-4B61-8A94-7B67D236919F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-2112-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.2\",\"matchCriteriaId\":\"B36C151E-7226-47A3-AF30-73A16523080D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-2112-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C653CF9A-080A-48B1-81F2-B72D2B4A1504\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-2102-t-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.2\",\"matchCriteriaId\":\"37CB9D16-448B-4D38-B73A-7EC2D463B90C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-2102-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D45B4C7D-A4D9-420D-A878-8ADB724AF24B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-2114-t-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.2\",\"matchCriteriaId\":\"DEB9AC0E-2426-47E0-84D6-0EC46564A701\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-2114-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9862617F-C1E4-4437-98E5-3A9322572C2E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-2116-t-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.2\",\"matchCriteriaId\":\"81146119-4408-4303-8D02-71649C2E5E0B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-2116-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC3535DE-C643-4BB0-A9A4-6B7641570BC1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-3101-t-us-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"70C07F0C-26EB-4704-94DB-CFE0ABDFABAD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-3101-t-us-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4C1ECFC-BFAE-41FD-A281-CDF7D4F50308\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-3101-t-eu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"940A9E9F-73E4-4FDA-99CF-336CD08B3EA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-3101-t-eu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F011C44-45F4-4147-9237-793C81EDE740\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-3111-t-us-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"78275480-E976-4AE3-AF09-DEDD423A8ADE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-3111-t-us-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5EF2E7B-586A-42DD-A202-068CE7B3495E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-3111-t-eu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"4BC0C744-609B-4D1C-9713-B6D5CB399E6D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-3111-t-eu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3827809F-C307-46E7-AE94-D108407B81FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-3121-t-us-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"22B0CD97-A115-4663-ADC1-D790884F52FA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-3121-t-us-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F22B234A-8AA0-4CB5-AF97-74320919DCF3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-3121-t-eu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"BE825E93-D508-4AD2-A7AE-FA10D0D910FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-3121-t-eu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B249A63B-AC3E-4342-A7B8-4FF05B0ACC33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-3101-t-ap-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"AC9E571C-271A-4A15-912D-5A7D5AFBBDA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-3101-t-ap-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3549908-B58E-4053-B3B6-709CAEF2E383\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-3111-t-ap-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"388D5633-5FCB-4EC9-B40C-F0034329CB55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-3111-t-ap-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4969D5B4-7704-48C2-B6C6-43AAB4FD4609\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-3121-t-ap-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"50C009F4-1440-44B5-B557-192D80F13BA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-3121-t-ap-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2B57685-91FC-4125-9C30-5FDD8A049381\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-3111-t-eu-lx-nw_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"69102C8C-DD75-4B81-BED4-FD1A9F4299A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-3111-t-eu-lx-nw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C400E9A7-C51B-476F-97B4-5B269A922231\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-3111-t-ap-lx-nw_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"99BDDE80-5306-4003-800A-4D26A49AD44D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-3111-t-ap-lx-nw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B63A3ADE-DFA0-4579-B3CA-4CCDADE0A00D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-3111-t-us-lx-nw_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"0EBE7629-E1A6-431E-9E31-7C81F2E98D0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-3111-t-us-lx-nw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51BBEAAB-C051-46CC-A7B8-D48BA272775A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-5101-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"62A556C9-3CBA-4438-9F0F-B89ED069CAFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-5101-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB51C37-B6B7-4D1B-B4A5-5A5CBC1DC0DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-5101-t-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"CF9934BC-0EF2-4B60-B574-72557C4D2B31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-5101-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03DAAE8E-16DF-4046-9867-86105DB279AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-5102-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"8277DEB2-19AD-4409-8093-9D17DCEEBE1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-5102-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C156071-5FA1-43EF-97CF-98385375D8B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-5102-t-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"437DC6E0-8A5C-4700-B45C-3250135DB602\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-5102-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"286A88C3-FD36-4241-8C48-A54332302050\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-5111-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"6CE4F803-3276-42A7-9B8F-164C0781FDD5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-5111-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E555662F-D557-4337-B490-C53AF0B2A8C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-5111-t-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"FF276820-3CBE-40A7-A195-9DA41D49FCB7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-5111-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DACA16B7-CAD0-4362-916A-A3A85F09B3F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-5112-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"67322925-CFEA-48FA-9956-CE095F652554\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-5112-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FF9A229-827B-471B-859A-CF51BD469A64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-5112-t-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"5557F1B3-B157-46DB-8D46-7D1DE5B4C4AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-5112-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F055724-0BEA-47A7-B8D3-5C5A7AFA5972\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8131-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndIncluding\":\"3.5\",\"matchCriteriaId\":\"A26AC4C2-A9B4-4716-9968-A6873D77CC53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8131-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10928A2-9245-40DC-B8FD-41CCB35D22C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8132-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndIncluding\":\"3.5\",\"matchCriteriaId\":\"926817FE-6DB8-4A72-8717-E2BFFFD3797E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8132-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C14FDB09-7888-4648-8E35-C1FA14EE7541\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8162-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndIncluding\":\"3.5\",\"matchCriteriaId\":\"6006D7E2-3333-4753-8F50-151F95010161\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8162-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"732AEFCC-7231-4788-869B-25B9247E52FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8112-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndIncluding\":\"3.5\",\"matchCriteriaId\":\"6CC0D0B2-B6C6-4D85-801F-F3E1D0B1D880\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8112-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7129CF3-628A-46C5-865B-9ADCC0658C03\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8112-me-t-lx1_firmware:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7150FF1-CB84-4333-919E-EEB724BE5811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8112-me-t-lx1_firmware:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7DCDE80-2B4B-4471-803F-00A22F2DBFC4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8112-me-t-lx1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BEEE468-A757-47A2-A7D4-E1C1C156D5A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8112-me-t-lx_firmware:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"891BE1A5-D271-4FFF-9B2E-781B7468090E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8112-me-t-lx_firmware:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89969730-202D-45BC-8F4B-D58F07CA6837\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8112-me-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6845A55-EE87-4A16-851A-9811D895ED3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8112a-me-t-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.6\",\"matchCriteriaId\":\"6C981788-D492-4C98-90D8-FB3E1CC6F2E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8112a-me-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC2F0871-28EA-4625-8389-E89A8D023A15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8220-t-lx-s_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.5\",\"matchCriteriaId\":\"D1B52909-8D70-4D08-8FB9-A1E9D065A33E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8220-t-lx-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AA15CCF-BFF5-4902-9654-195E0C67FC65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8220-t-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.5\",\"matchCriteriaId\":\"567F7467-599E-4791-845D-A738AB88619D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8220-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D65808DD-2672-42D7-8544-8A9E0D1519E5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8220-t-lx-us-s_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.5\",\"matchCriteriaId\":\"9A68B62A-7F2B-4E0F-B19F-5302D26DAC2F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8220-t-lx-us-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"726EC056-8BC7-4ACC-A6FF-7E7664859B03\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8220-t-lx-eu-s_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.5\",\"matchCriteriaId\":\"399E3AB3-AB37-41CD-B6C2-EE74A3934F58\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8220-t-lx-eu-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D493C8-E0E4-4C2B-8A95-66DB61BD7035\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8220-t-lx-ap-s_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.5\",\"matchCriteriaId\":\"D6C40499-C4D6-40B8-ABDC-3F0017D561AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8220-t-lx-ap-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC404D8-D558-462F-898F-9CFE54330FD2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:aig-301-t-us-azu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"F87F6520-23D3-4507-AE36-4DAED16A89DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:aig-301-t-us-azu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22EDD7CD-C868-47BE-9804-CC380825D101\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:aig-301-t-eu-azu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"F24BD78F-9F0B-48A5-B43C-8D63C21A93AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:aig-301-t-eu-azu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B21981D-A11E-47E4-97FA-BC32CAB108EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:aig-301-t-ap-azu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"3255F466-441A-4C23-AF19-B6C280F26682\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:aig-301-t-ap-azu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7CDBA9-8884-4A0A-B935-3F778E4D02E5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:aig-301-t-cn-azu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"2D26944A-7A5B-4220-9275-F03C429875DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:aig-301-t-cn-azu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B04FDEF-216F-44C5-A7C4-CA9F4F190B57\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:aig-301-t-azu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"AE307ADF-9031-4538-9428-BD5BFB909472\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:aig-301-t-azu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"167BCD50-0459-4A18-A732-9BB97B0BF89D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:aig-301-azu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"BF686721-62C8-4CAA-A877-D944ABEB947A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:aig-301-azu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BB592D9-E965-46B1-86B5-D8E458679F86\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:aig-301-us-azu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"1293AA12-1E27-49CC-9ABE-71A49AD86CD0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:aig-301-us-azu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAAF14E7-432C-4E0B-BB69-E4276D46A459\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:aig-301-eu-azu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"11695165-85D4-4951-99F4-AC1848091BBB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:aig-301-eu-azu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB29D0B7-D529-4462-97FF-87788F95E6D2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:aig-301-ap-azu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"65472D58-58CB-4FD5-A10B-50C47C5FAAD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:aig-301-ap-azu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"326E0036-C2CB-42A5-9099-301AD09431E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:aig-301-cn-azu-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.4\",\"matchCriteriaId\":\"D9CCF641-A28A-46AC-995F-916971F38541\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:aig-301-cn-azu-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C764E5E-4EFC-42A0-AA6D-75F9D7748D66\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8410a-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.2\",\"versionEndIncluding\":\"4.1.2\",\"matchCriteriaId\":\"CA6F056F-C2FD-4CE9-B2C6-A5B789809B73\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8410a-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08B660E3-EDC3-46F1-9B7C-27DF6C9361F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8410a-t-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.2\",\"versionEndIncluding\":\"4.1.2\",\"matchCriteriaId\":\"8FF8F8F2-8431-4B64-9ED3-53C5DDD2684C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8410a-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC2B1263-2F49-43BF-AE2A-631F252E2820\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8410a-nw-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.2\",\"versionEndIncluding\":\"4.1.2\",\"matchCriteriaId\":\"54841BEC-E835-4F46-B3B1-0A3700E573EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8410a-nw-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B6C0056-578C-4429-8A1E-7638D5C1CCEB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8410a-nw-t-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.2\",\"versionEndIncluding\":\"4.1.2\",\"matchCriteriaId\":\"7C413DB9-5CF3-49C0-85B7-48DE54FF4BFA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8410a-nw-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D38C84-9329-4320-B435-9F29A48EA06D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8580-lx_firmware:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F85FE95A-314B-4D51-8A83-F44DC0CE5D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8580-lx_firmware:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D15B8DEB-B6CE-406E-A6DB-0FF20E4B646E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8580-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A766734-2683-439D-8814-C0989B082CEE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8580-t-lx_firmware:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D44D2D55-F791-4DAE-A0FD-B221806B00F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8580-t-lx_firmware:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92388BD-E850-4F9B-84E9-E63C49CE9599\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8580-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10983BA-E998-481E-A994-6D48DB986089\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8580-t-ct-lx_firmware:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5E46608-A0C6-4415-9ECB-A50D5B372386\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8580-t-ct-lx_firmware:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8DB2785-B95C-4469-9300-4DA686BB55A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8580-t-ct-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B306C0E-4807-4870-B836-7250F0A9F036\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8580-q-lx_firmware:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C64280FC-5B1A-44C0-BB0A-C9421DCE6825\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8580-q-lx_firmware:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB1B9FC-7EA6-489C-AC73-727494502CDC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8580-q-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36C4FE9E-9767-45A8-A585-F1641746BFBB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8580-t-q-lx_firmware:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E26664-5828-4799-95A2-D5BD2600FEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8580-t-q-lx_firmware:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD8BF357-A572-47F2-A721-7C41E41523C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8580-t-q-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F238A13-893F-426F-BF29-48DDE9AFE2BE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8580-t-ct-q-lx_firmware:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEDD6758-BB65-42C1-84D9-1F479D828A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8580-t-ct-q-lx_firmware:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC173EEF-B508-451E-912E-4BD7FF529F1B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8580-t-ct-q-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDBC0E20-0DA0-4724-B515-7FFBAF3FA2EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8540-lx_firmware:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56098FF1-8B57-49C3-B72A-C6CAE6DEBCD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8540-lx_firmware:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0997D2AC-06C9-49EF-81D1-0D717536EB5E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8540-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9297DE42-0B5E-4BE4-9773-0583DA4CAB2D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8540-t-lx_firmware:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480722DC-2DBB-43AC-A61E-8DDFC3449975\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8540-t-lx_firmware:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CBEB056-6309-41B1-BCE5-69EDC1C1BA0C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8540-t-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25F11CDF-4D2A-4A85-B50D-A7754279BDD1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8540-t-ct-lx_firmware:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"337186CB-CDCE-4B29-A177-C9E157FD0594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:uc-8540-t-ct-lx_firmware:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE4DDCB-410F-4505-95DE-7DAF04BA6E54\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:uc-8540-t-ct-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"848FF5D2-6EC9-43E4-8CDF-2EEAA20AEB3A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:da-662c-16-lx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.2\",\"versionEndIncluding\":\"1.1.2\",\"matchCriteriaId\":\"5AA6D657-9B9F-4E7C-B43B-3207D42C134B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:da-662c-16-lx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D24EC0-A5E7-4207-8E0E-3D5320914BFA\"}]}]}],\"references\":[{\"url\":\"https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T01:00:10.008Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-3088\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-16T17:25:51.797778Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-16T17:25:53.236Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"value\": \"En Garde ICSRange research team reported this vulnerability to CISA. \"}], \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Moxa\", \"product\": \"UC-8100A-ME-T System Imaage\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.6\"}]}, {\"vendor\": \"Moxa\", \"product\": \"UC-2100 System Image\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.12\"}]}, {\"vendor\": \"Moxa\", \"product\": \"UC-2100-W System Image\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.12\"}]}, {\"vendor\": \"Moxa\", \"product\": \"UC-3100 System Image\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.6\"}]}, {\"vendor\": \"Moxa\", \"product\": \"UC-5100 System Image\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.4\"}]}, {\"vendor\": \"Moxa\", \"product\": \"UC-8100 System Image\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"3.5\"}]}, {\"vendor\": \"Moxa\", \"product\": \"UC-8100-ME-T System Image\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"3.1\"}]}, {\"vendor\": \"Moxa\", \"product\": \"UC-8200 System Image\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.5\"}]}, {\"vendor\": \"Moxa\", \"product\": \"AIG-300 System Image\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.4\"}]}, {\"vendor\": \"Moxa\", \"product\": \"UC-8410A with Debian 9 System Image\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0.2 and 4.1.2\"}]}, {\"vendor\": \"Moxa\", \"product\": \"UC-8580 with Debian 9 System Image\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0 and 2.1\"}]}, {\"vendor\": \"Moxa\", \"product\": \"UC-8540 with Debian 9 System Image\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0 and 2.1\"}]}, {\"vendor\": \"Moxa\", \"product\": \"DA-662C-16-LX (GLB) System Image\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.2\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.1.2\"}]}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Moxa developed updates to address this vulnerability. Users should follow the instructions in Moxa\u0027s security advisory to update their system image.  \"}], \"datePublic\": \"2022-11-22T00:00:00.000Z\", \"references\": [{\"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12,\u0026nbsp;UC-3100 System Image: Versions v1.0 to v1.6,\u0026nbsp;UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa\u0027s ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-250\", \"description\": \"CWE-250 Execution with Unnecessary Privileges\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2022-12-07T00:00:00.000Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-3088\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-16T17:42:25.272Z\", \"dateReserved\": \"2022-09-01T00:00:00.000Z\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"datePublished\": \"2022-11-22T00:00:00.000Z\", \"assignerShortName\": \"icscert\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…