var-201608-0259
Vulnerability from variot

Moxa OnCell G3100V2 devices before 2.8 and G3111, G3151, G3211, and G3251 devices before 1.7 do not properly restrict authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack. Supplementary information : CWE Vulnerability type by CWE-285: Improper Authorization ( Inappropriate authentication ) Has been identified. http://cwe.mitre.org/data/definitions/285.htmlRound robin by a third party (brute-force) Access may be gained through an attack. MoxaOnCellG3100V2 and so on are Moxa's IP gateway products. A remote attacker can exploit the vulnerability to gain access by exploiting a brute force attack. Moxa OnCell is prone to a remote unspecified authentication bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. The following products are vulnerable: OnCell G3100V2 Series versions prior to 2.8 are vulnerable. OnCell G3111/G3151/G3211/G3251 Series versions prior to 1.7 are vulnerable. A security vulnerability exists in several Moxa products

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201608-0259",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "oncell g3001",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "1.6"
      },
      {
        "model": "oncell g3100v2",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "2.7"
      },
      {
        "model": "oncell g3100v2 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "oncell g3100v2 series",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "moxa",
        "version": "2.8"
      },
      {
        "model": "oncell g3111/g3151/g3211/g3251 series",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "moxa",
        "version": "1.7"
      },
      {
        "model": "oncell g3151",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "oncell g3211",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "oncell g3251",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "oncell g3100v2",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "2.8"
      },
      {
        "model": "oncell g3251",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.7"
      },
      {
        "model": "oncell g3211",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.7"
      },
      {
        "model": "oncell g3111",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.7"
      },
      {
        "model": "oncell g3151",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.7"
      },
      {
        "model": "oncell g3001",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.6"
      },
      {
        "model": "oncell g3100v2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "2.7"
      },
      {
        "model": "oncell g3251",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.6"
      },
      {
        "model": "oncell g3251",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.4"
      },
      {
        "model": "oncell g3251",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "oncell g3211",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.6"
      },
      {
        "model": "oncell g3211",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.4"
      },
      {
        "model": "oncell g3211",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "oncell g3151",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.6"
      },
      {
        "model": "oncell g3151",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.4"
      },
      {
        "model": "oncell g3151",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "oncell g3111",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.6"
      },
      {
        "model": "oncell g3111",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.4"
      },
      {
        "model": "oncell g3111",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "oncell g3100v2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "2.6"
      },
      {
        "model": "oncell g3251",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.7"
      },
      {
        "model": "oncell g3211",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.7"
      },
      {
        "model": "oncell g3151",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.7"
      },
      {
        "model": "oncell g3111",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.7"
      },
      {
        "model": "oncell g3100v2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "2.8"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06703"
      },
      {
        "db": "BID",
        "id": "92606"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004449"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-430"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5799"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:moxa:oncell_g3100v2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:oncell_g3100v2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:oncell_g3001_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:oncell_gateway_g3151",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:oncell_gateway_g3211",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:oncell_gateway_g3251",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004449"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Maxim Rupp.",
    "sources": [
      {
        "db": "BID",
        "id": "92606"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-5799",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2016-5799",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2016-06703",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-94618",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2016-5799",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-5799",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-5799",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-06703",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201608-430",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-94618",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06703"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004449"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-430"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5799"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Moxa OnCell G3100V2 devices before 2.8 and G3111, G3151, G3211, and G3251 devices before 1.7 do not properly restrict authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack. Supplementary information : CWE Vulnerability type by CWE-285: Improper Authorization ( Inappropriate authentication ) Has been identified. http://cwe.mitre.org/data/definitions/285.htmlRound robin by a third party (brute-force) Access may be gained through an attack. MoxaOnCellG3100V2 and so on are Moxa\u0027s IP gateway products. A remote attacker can exploit the vulnerability to gain access by exploiting a brute force attack. Moxa OnCell is prone to a remote unspecified authentication bypass vulnerability. \nAn attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. \nThe following products are vulnerable:\nOnCell G3100V2 Series versions prior to 2.8 are vulnerable. \nOnCell G3111/G3151/G3211/G3251 Series versions prior to 1.7 are vulnerable. A security vulnerability exists in several Moxa products",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-5799"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004449"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-06703"
      },
      {
        "db": "BID",
        "id": "92606"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94618"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-5799",
        "trust": 3.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-236-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "92606",
        "trust": 2.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004449",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-430",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-06703",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-94618",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06703"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94618"
      },
      {
        "db": "BID",
        "id": "92606"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004449"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-430"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5799"
      }
    ]
  },
  "id": "VAR-201608-0259",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06703"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94618"
      }
    ],
    "trust": 1.3728571659999997
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06703"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:54:29.542000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Firmware for OnCell G3100V2 Series",
        "trust": 0.8,
        "url": "http://www.moxa.com/support/sarch_result.aspx?type=soft\u0026prod_id=416\u0026type_id=4"
      },
      {
        "title": "Firmware for OnCell G3111/G3151/G3211/G3251 Series",
        "trust": 0.8,
        "url": "http://www.moxa.com/support/sarch_result.aspx?type=soft\u0026prod_id=316\u0026type_id=4"
      },
      {
        "title": "A variety of Moxa product permissions to obtain vulnerability patches",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/80731"
      },
      {
        "title": "Multiple Moxa Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63744"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06703"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004449"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-430"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-285",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-94618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004449"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5799"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-236-01"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/92606"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5799"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5799"
      },
      {
        "trust": 0.6,
        "url": "http://www.moxa.com/support/sarch_result.aspx?type=soft\u0026prod_id=316\u0026type_id=4"
      },
      {
        "trust": 0.6,
        "url": "http://www.moxa.com/support/sarch_result.aspx?type=soft\u0026prod_id=416\u0026type_id=4"
      },
      {
        "trust": 0.3,
        "url": "http://www.moxa.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06703"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94618"
      },
      {
        "db": "BID",
        "id": "92606"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004449"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-430"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5799"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-06703"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94618"
      },
      {
        "db": "BID",
        "id": "92606"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004449"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-430"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5799"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-08-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-06703"
      },
      {
        "date": "2016-08-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-94618"
      },
      {
        "date": "2016-08-23T00:00:00",
        "db": "BID",
        "id": "92606"
      },
      {
        "date": "2016-08-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004449"
      },
      {
        "date": "2016-08-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201608-430"
      },
      {
        "date": "2016-08-24T02:00:24.087000",
        "db": "NVD",
        "id": "CVE-2016-5799"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-08-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-06703"
      },
      {
        "date": "2016-11-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-94618"
      },
      {
        "date": "2016-08-23T00:00:00",
        "db": "BID",
        "id": "92606"
      },
      {
        "date": "2016-08-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004449"
      },
      {
        "date": "2016-08-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201608-430"
      },
      {
        "date": "2024-11-21T02:55:01.943000",
        "db": "NVD",
        "id": "CVE-2016-5799"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-430"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Moxa OnCell Vulnerability to gain access rights on devices",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004449"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201608-430"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…