var-201702-0597
Vulnerability from variot

An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING). plural Moxa NPort The product contains a cross-site scripting vulnerability.A cross-site scripting attack may be performed. MOXANport is a serial communication server. An attacker exploits a vulnerability to initiate a cross-site attack. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0597",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nport 5200 series",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "2.7"
      },
      {
        "model": "nport 5600 series",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "3.6"
      },
      {
        "model": "nport 5400 series",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "3.10"
      },
      {
        "model": "nport p5150a series",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "1.2"
      },
      {
        "model": "nport 5100 series",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "3.5"
      },
      {
        "model": "nport 5600-8-dtl series",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "2.3"
      },
      {
        "model": "nport 5100a series",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "1.2"
      },
      {
        "model": "nport 5100 series",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "2.5"
      },
      {
        "model": "nport 5x50a1-m12 series",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "1.1"
      },
      {
        "model": "nport 6100 series",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "1.13"
      },
      {
        "model": "nport 5200a series",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "1.2"
      },
      {
        "model": "nport 5100 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5100a series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5110",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5110a",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5130",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5130a",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5150",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5150a",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5150a1-m12",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5150a1-m12-ct",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5150a1-m12-ct-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5150a1-m12-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5200 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5200a series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5210",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5210a",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5230",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5230a",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5232",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5232i",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5250a",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5250a1-m12",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5250a1-m12-ct",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5250a1-m12-ct-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5250a1-m12-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5400 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5410",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5430",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5430i",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5450",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5450-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5450a1-m12",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5450a1-m12-ct",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5450a1-m12-ct-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5450a1-m12-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5450i",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5450i-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5600 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5600-8-dtl series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5610",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5610-8-dtl",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5630",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5650",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5650-8-dtl",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5650i-8-dtl",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 5x50a1-m12 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 6100 series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 6150",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport 6150-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport p5110a",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport p5150a series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "5110\u003c2.6"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "5130/5150\u003c3.6"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "5200\u003c2.8"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "5400\u003c3.11"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "5600\u003c3.7"
      },
      {
        "model": "nport p5150a",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.3"
      },
      {
        "model": "nport 5100a",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.3"
      },
      {
        "model": "nport 5200a",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.3"
      },
      {
        "model": "nport 5150ai-m12",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.2"
      },
      {
        "model": "nport 5250ai-m12",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.2"
      },
      {
        "model": "nport 5450ai-m12",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.2"
      },
      {
        "model": "nport 5600-8-dt",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "2.4"
      },
      {
        "model": "nport 5600-8-dtl",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "2.4"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "6x50\u003c1.13.11"
      },
      {
        "model": "nport ia5450a",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.4"
      },
      {
        "model": "nport 5100 series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "3.5"
      },
      {
        "model": "nport 6100 series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.13"
      },
      {
        "model": "nport 5600-8-dtl series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "2.3"
      },
      {
        "model": "nport 5100 series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "2.5"
      },
      {
        "model": "nport 5400 series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "3.10"
      },
      {
        "model": "nport p5150a series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.2"
      },
      {
        "model": "nport 5100a series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.2"
      },
      {
        "model": "nport 5200a series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.2"
      },
      {
        "model": "nport 5600 series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "3.6"
      },
      {
        "model": "nport 5x50a1-m12 series",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "1.1"
      },
      {
        "model": "nport p5150a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "nport ia5450a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "6x500"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "66501.13"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "66101.13"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "64501.13"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "62501.13"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "61501.13"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "61101.13"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "61100"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "60000"
      },
      {
        "model": "nport 5x50ai-m12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "nport 5600-dt/dtl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "nport 5600-8-dtl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "56000"
      },
      {
        "model": "nport 5450ai-m12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "54000"
      },
      {
        "model": "nport 5250ai-m12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "nport 5200a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "52000"
      },
      {
        "model": "nport 5150ai-m12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51503.5"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51303.5"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51102.5"
      },
      {
        "model": "nport 5100a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "0"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51000"
      },
      {
        "model": "nport ia5450a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.4"
      },
      {
        "model": "nport",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "6x501.14"
      },
      {
        "model": "nport 5600-8-dtl",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.3"
      },
      {
        "model": "nport 5600-8-dt",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "2.4"
      },
      {
        "model": "nport",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "56003.7"
      },
      {
        "model": "nport 5450ai-m12",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.2"
      },
      {
        "model": "nport",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "54003.11"
      },
      {
        "model": "nport 5250ai-m12",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.2"
      },
      {
        "model": "nport 5200a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.3"
      },
      {
        "model": "nport",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "52002.8"
      },
      {
        "model": "nport 5150ai-m12",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.2"
      },
      {
        "model": "nport",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51503.6"
      },
      {
        "model": "nport",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51303.6"
      },
      {
        "model": "nport",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51102.6"
      },
      {
        "model": "nport 5100a",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "1.3"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-11882"
      },
      {
        "db": "BID",
        "id": "85965"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007645"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-033"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-9371"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:moxa:nport_5100_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:nport_5100a_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5110",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5110a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5130",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5130a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5150",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5150a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct-t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:nport_5200_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:nport_5200a_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5210",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5210a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5230",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5230a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5232",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5232i",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5250a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct-t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:nport_5400_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5410",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5430",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5430i",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5450",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5450-t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct-t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5450i",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5450i-t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:nport_5600_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:nport_5600-8-dtl_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5610",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5610-8-dtl",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5630",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5650",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5650-8-dtl",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_5650i-8-dtl",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:nport_5x50a1-m12_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:nport_6100_series_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_6150",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_6150-t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:moxa:nport_p5110a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:nport_p5150a_series_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007645"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Reid Wightman of Digital Bonds Labs",
    "sources": [
      {
        "db": "BID",
        "id": "85965"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-033"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2016-9371",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2016-9371",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-11882",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-98191",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "id": "CVE-2016-9371",
            "impactScore": 2.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.8,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-9371",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-9371",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-11882",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201612-033",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-98191",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-11882"
      },
      {
        "db": "VULHUB",
        "id": "VHN-98191"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007645"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-033"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-9371"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4.  User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING). plural Moxa NPort The product contains a cross-site scripting vulnerability.A cross-site scripting attack may be performed. MOXANport is a serial communication server. An attacker exploits a vulnerability to initiate a cross-site attack. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-9371"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007645"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11882"
      },
      {
        "db": "BID",
        "id": "85965"
      },
      {
        "db": "VULHUB",
        "id": "VHN-98191"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-9371",
        "trust": 3.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-336-02",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "85965",
        "trust": 2.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007645",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-033",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11882",
        "trust": 0.6
      },
      {
        "db": "ICS CERT ALERT",
        "id": "ICS-ALERT-16-099-01",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-98191",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-11882"
      },
      {
        "db": "VULHUB",
        "id": "VHN-98191"
      },
      {
        "db": "BID",
        "id": "85965"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007645"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-033"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-9371"
      }
    ]
  },
  "id": "VAR-201702-0597",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-11882"
      },
      {
        "db": "VULHUB",
        "id": "VHN-98191"
      }
    ],
    "trust": 1.592224151
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-11882"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:54:16.937000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
        "trust": 0.8,
        "url": "http://japan.moxa.com/index.htm"
      },
      {
        "title": "MoxaNPort Cross-Site Scripting Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/84970"
      },
      {
        "title": "Multiple Moxa Nport Fixes for product cross-site scripting vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66086"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-11882"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007645"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-033"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-98191"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007645"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-9371"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/85965"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9371"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9371"
      },
      {
        "trust": 0.3,
        "url": "http://www.moxa.com/product/vport_sdk.htm"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-11882"
      },
      {
        "db": "VULHUB",
        "id": "VHN-98191"
      },
      {
        "db": "BID",
        "id": "85965"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007645"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-033"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-9371"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-11882"
      },
      {
        "db": "VULHUB",
        "id": "VHN-98191"
      },
      {
        "db": "BID",
        "id": "85965"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007645"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-033"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-9371"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-12-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-11882"
      },
      {
        "date": "2017-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-98191"
      },
      {
        "date": "2016-04-08T00:00:00",
        "db": "BID",
        "id": "85965"
      },
      {
        "date": "2017-03-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007645"
      },
      {
        "date": "2016-04-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201612-033"
      },
      {
        "date": "2017-02-13T21:59:02.347000",
        "db": "NVD",
        "id": "CVE-2016-9371"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-12-06T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-11882"
      },
      {
        "date": "2017-02-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-98191"
      },
      {
        "date": "2016-12-20T02:04:00",
        "db": "BID",
        "id": "85965"
      },
      {
        "date": "2017-03-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007645"
      },
      {
        "date": "2016-12-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201612-033"
      },
      {
        "date": "2024-11-21T03:01:02.400000",
        "db": "NVD",
        "id": "CVE-2016-9371"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-033"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Moxa NPort Product cross-site scripting vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007645"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-033"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…