var-201702-0860
Vulnerability from variot
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating. MOXANport is a serial communication server. MoxaNPort has a credential management vulnerability. An unauthenticated attacker exploits the vulnerability to obtain an administrator password. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. ##
This module requires Metasploit: https://metasploit.com/download
Current source: https://github.com/rapid7/metasploit-framework
class MetasploitModule < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Auxiliary::UDPScanner
def initialize(info = {}) super( update_info( info, 'Name' => 'Moxa UDP Device Discovery', 'Description' => %q( The Moxa protocol listens on 4800/UDP and will respond to broadcast or direct traffic. The service is known to be used on Moxa devices in the NPort, OnCell, and MGate product lines.
A discovery packet compels a Moxa device to respond to the sender
with some basic device information that is needed for more advanced
functions. The discovery data is 8 bytes in length and is the most
basic example of the Moxa protocol. It may be sent out as a
broadcast (destination 255.255.255.255) or to an individual device.
Devices that respond to this query may be vulnerable to serious
information disclosure vulnerabilities, such as CVE-2016-9361.
The module is the work of Patrick DeSantis of Cisco Talos and is
derived from original work by K. Reid Wightman. Tested and validated
on a Moxa NPort 6250 with firmware versions 1.13 and 1.15.
),
'Author' => 'Patrick DeSantis <p[at]t-r10t.com>',
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2016-9361'],
[ 'URL', 'https://www.digitalbond.com/blog/2016/10/25/serial-killers/'],
[ 'URL', 'http://www.moxa.com/support/faq/faq_detail.aspx?id=646' ],
]
)
)
register_options(
[
# Moxa protocol listens on 4800/UDP by default
Opt::RPORT(4800)
])
end
# The data to be sent via UDP def build_probe # Function Code (first byte) 0x01: Moxa discovery/identify # The fourth byte is the length of the full data payload @probe ||= "\x01\x00\x00\x08\x00\x00\x00\x00" end
# Called for each response packet def scanner_process(response, src_host, _src_port) # The first byte of a response will always be the func code + 0x80 # (the most significant bit of the byte is set to 1, so 0b00000001 # becomes 0b10000001, or 0x81). # A valid response is 24 bytes, starts with 0x81, and contains the values # 0x00, 0x90, 0xe8 (the Moxa OIU) in bytes 14, 15, and 16. return unless response[0] == "\x81" && response[14..16] == "\x00\x90\xe8" && response.length == 24 @results[src_host] ||= [] @results[src_host] << response end
# Called after the scan block def scanner_postscan(_batch) @results.each_pair do |host, response| peer = "#{host}:#{rport}"
# Report the host
report_host(
:host => host,
:info => "Moxa Device",
)
# Report the service
report_service(
host: host,
proto: 'udp',
port: rport,
name: 'Moxa Protocol',
)
if response.empty?
vprint_status("#{peer} No Moxa Devices Found.")
else
print_good("#{peer} Moxa Device Found!")
# Report vuln
report_vuln(
host: host,
port: rport,
proto: 'udp',
name: 'Moxa Protocol Use',
refs: references
)
end
end
end end
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0860", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nport 5200 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5600 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.6" }, { "model": "nport 5400 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5x50a1-m12 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.1" }, { "model": "nport 6100 series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5200a series", "scope": "lte", "trust": 1.0, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5100a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5130a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5150a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5200a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5210a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5230a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5232i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5250a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5400 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5410", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5430i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-ct-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450a1-m12-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5450i-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5600-8-dtl series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5610-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5630", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5650i-8-dtl", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 5x50a1-m12 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6100 series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport 6150-t", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5110a", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport p5150a series", "scope": null, "trust": 0.8, "vendor": "moxa", "version": null }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5110\u003c2.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5130/5150\u003c3.6" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5200\u003c2.8" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5400\u003c3.11" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "5600\u003c3.7" }, { "model": "nport p5150a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5100a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5200a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5150ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5250ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5450ai-m12", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5600-8-dt", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport 5600-8-dtl", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "6x50\u003c1.13.11" }, { "model": "nport ia5450a", "scope": "lt", "trust": 0.6, "vendor": "moxa", "version": "1.4" }, { "model": "nport 6100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.13" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.5" }, { "model": "nport 5600-8-dtl series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.3" }, { "model": "nport 5100 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.5" }, { "model": "nport 5400 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "3.10" }, { "model": "nport p5150a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5100a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "2.7" }, { "model": "nport 5x50a1-m12 series", "scope": "eq", "trust": 0.6, "vendor": "moxa", "version": "1.1" }, { "model": "nport p5150a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport ia5450a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "6x500" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "66101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "64501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "62501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61501.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61101.13" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "61100" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "60000" }, { "model": "nport 5x50ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-dt/dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5600-8-dtl", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "56000" }, { "model": "nport 5450ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "54000" }, { "model": "nport 5250ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport 5200a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "52000" }, { "model": "nport 5150ai-m12", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51503.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51303.5" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51102.5" }, { "model": "nport 5100a", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "0" }, { "model": "nport", "scope": "eq", "trust": 0.3, "vendor": "moxa", "version": "51000" }, { "model": "nport ia5450a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "6x501.14" }, { "model": "nport 5600-8-dtl", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport 5600-8-dt", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "2.4" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "56003.7" }, { "model": "nport 5450ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "54003.11" }, { "model": "nport 5250ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport 5200a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "52002.8" }, { "model": "nport 5150ai-m12", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.2" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51503.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51303.6" }, { "model": "nport", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "51102.6" }, { "model": "nport 5100a", "scope": "ne", "trust": 0.3, "vendor": "moxa", "version": "1.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:moxa:nport_5100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5100a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5130a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5150a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5200a_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5210a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5230a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5232i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5250a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5400_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5410", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5430i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-ct-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450a1-m12-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5450i-t", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5600-8-dtl_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5610-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5630", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_5650i-8-dtl", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_5x50a1-m12_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_6100_series_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_6150-t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:moxa:nport_p5110a", "vulnerable": true }, { "cpe22Uri": "cpe:/o:moxa:nport_p5150a_series_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007639" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reid Wightman of Digital Bonds Labs", "sources": [ { "db": "BID", "id": "85965" }, { "db": "CNNVD", "id": "CNNVD-201612-030" } ], "trust": 0.9 }, "cve": "CVE-2016-9361", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-9361", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-11885", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-98181", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-9361", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-9361", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-9361", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2016-11885", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201612-030", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-98181", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-9361", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating. MOXANport is a serial communication server. MoxaNPort has a credential management vulnerability. An unauthenticated attacker exploits the vulnerability to obtain an administrator password. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. ##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule \u003c Msf::Auxiliary\n include Msf::Auxiliary::Report\n include Msf::Auxiliary::UDPScanner\n\n def initialize(info = {})\n super(\n update_info(\n info,\n \u0027Name\u0027 =\u003e \u0027Moxa UDP Device Discovery\u0027,\n \u0027Description\u0027 =\u003e %q(\n The Moxa protocol listens on 4800/UDP and will respond to broadcast\n or direct traffic. The service is known to be used on Moxa devices\n in the NPort, OnCell, and MGate product lines. \n\n A discovery packet compels a Moxa device to respond to the sender\n with some basic device information that is needed for more advanced\n functions. The discovery data is 8 bytes in length and is the most\n basic example of the Moxa protocol. It may be sent out as a\n broadcast (destination 255.255.255.255) or to an individual device. \n\n Devices that respond to this query may be vulnerable to serious\n information disclosure vulnerabilities, such as CVE-2016-9361. \n\n The module is the work of Patrick DeSantis of Cisco Talos and is\n derived from original work by K. Reid Wightman. Tested and validated\n on a Moxa NPort 6250 with firmware versions 1.13 and 1.15. \n ),\n \u0027Author\u0027 =\u003e \u0027Patrick DeSantis \u003cp[at]t-r10t.com\u003e\u0027,\n \u0027License\u0027 =\u003e MSF_LICENSE,\n \u0027References\u0027 =\u003e\n [\n [ \u0027CVE\u0027, \u00272016-9361\u0027],\n [ \u0027URL\u0027, \u0027https://www.digitalbond.com/blog/2016/10/25/serial-killers/\u0027],\n [ \u0027URL\u0027, \u0027http://www.moxa.com/support/faq/faq_detail.aspx?id=646\u0027 ],\n ]\n )\n )\n\n register_options(\n [\n # Moxa protocol listens on 4800/UDP by default\n Opt::RPORT(4800)\n ])\n end\n\n # The data to be sent via UDP\n def build_probe\n # Function Code (first byte) 0x01: Moxa discovery/identify\n # The fourth byte is the length of the full data payload\n @probe ||= \"\\x01\\x00\\x00\\x08\\x00\\x00\\x00\\x00\"\n end\n\n # Called for each response packet\n def scanner_process(response, src_host, _src_port)\n # The first byte of a response will always be the func code + 0x80\n # (the most significant bit of the byte is set to 1, so 0b00000001\n # becomes 0b10000001, or 0x81). \n # A valid response is 24 bytes, starts with 0x81, and contains the values\n # 0x00, 0x90, 0xe8 (the Moxa OIU) in bytes 14, 15, and 16. \n return unless response[0] == \"\\x81\" \u0026\u0026 response[14..16] == \"\\x00\\x90\\xe8\" \u0026\u0026 response.length == 24\n @results[src_host] ||= []\n @results[src_host] \u003c\u003c response\n end\n\n # Called after the scan block\n def scanner_postscan(_batch)\n @results.each_pair do |host, response|\n peer = \"#{host}:#{rport}\"\n\n # Report the host\n report_host(\n :host =\u003e host,\n :info =\u003e \"Moxa Device\",\n )\n\n # Report the service\n report_service(\n host: host,\n proto: \u0027udp\u0027,\n port: rport,\n name: \u0027Moxa Protocol\u0027,\n )\n\n if response.empty?\n vprint_status(\"#{peer} No Moxa Devices Found.\")\n else\n print_good(\"#{peer} Moxa Device Found!\")\n\n # Report vuln\n report_vuln(\n host: host,\n port: rport,\n proto: \u0027udp\u0027,\n name: \u0027Moxa Protocol Use\u0027,\n refs: references\n )\n end\n end\n end\nend\n", "sources": [ { "db": "NVD", "id": "CVE-2016-9361" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "BID", "id": "85965" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "PACKETSTORM", "id": "180949" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-9361", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-16-336-02", "trust": 3.5 }, { "db": "BID", "id": "85965", "trust": 2.1 }, { "db": "JVNDB", "id": "JVNDB-2016-007639", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201612-030", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11885", "trust": 0.6 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-16-099-01", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-98181", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-9361", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "180949", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "PACKETSTORM", "id": "180949" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "id": "VAR-201702-0860", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" } ], "trust": 1.592224151 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" } ] }, "last_update_date": "2024-11-23T21:54:17.013000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://japan.moxa.com/index.htm" }, { "title": "MoxaNPort Credential Management Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/84974" }, { "title": "Multiple Moxa Nport Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66082" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "CNNVD", "id": "CNNVD-201612-030" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-98181" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.5, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/85965" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9361" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9361" }, { "trust": 0.3, "url": "http://www.moxa.com/product/vport_sdk.htm" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/modules/auxiliary/scanner/scada/moxa_discover" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9361" }, { "trust": 0.1, "url": "https://github.com/rapid7/metasploit-framework" }, { "trust": 0.1, "url": "https://metasploit.com/download" }, { "trust": 0.1, "url": "https://www.digitalbond.com/blog/2016/10/25/serial-killers/\u0027]," }, { "trust": 0.1, "url": "http://www.moxa.com/support/faq/faq_detail.aspx?id=646\u0027" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "PACKETSTORM", "id": "180949" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11885" }, { "db": "VULHUB", "id": "VHN-98181" }, { "db": "VULMON", "id": "CVE-2016-9361" }, { "db": "BID", "id": "85965" }, { "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "db": "PACKETSTORM", "id": "180949" }, { "db": "CNNVD", "id": "CNNVD-201612-030" }, { "db": "NVD", "id": "CVE-2016-9361" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2016-11885" }, { "date": "2017-02-13T00:00:00", "db": "VULHUB", "id": "VHN-98181" }, { "date": "2017-02-13T00:00:00", "db": "VULMON", "id": "CVE-2016-9361" }, { "date": "2016-04-08T00:00:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "date": "2024-08-31T23:16:47", "db": "PACKETSTORM", "id": "180949" }, { "date": "2016-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-030" }, { "date": "2017-02-13T21:59:02.080000", "db": "NVD", "id": "CVE-2016-9361" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-06T00:00:00", "db": "CNVD", "id": "CNVD-2016-11885" }, { "date": "2017-02-17T00:00:00", "db": "VULHUB", "id": "VHN-98181" }, { "date": "2017-02-17T00:00:00", "db": "VULMON", "id": "CVE-2016-9361" }, { "date": "2016-12-20T02:04:00", "db": "BID", "id": "85965" }, { "date": "2017-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007639" }, { "date": "2016-12-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-030" }, { "date": "2024-11-21T03:01:01.187000", "db": "NVD", "id": "CVE-2016-9361" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-030" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Moxa NPort Vulnerability in product management passwords being retried without authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007639" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-030" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.