Vulnerabilites related to moxa - nport_6650-16
Vulnerability from fkie_nvd
Published
2023-11-01 16:15
Modified
2024-11-21 08:42
Summary
A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6150-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "753655A9-BC00-4D1E-B706-683591DD3D84",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16561579-3023-4987-BA2D-510E7F702F95",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6150_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EED0A1-0FCB-4FC7-9A58-FE1D7E87E56D",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87373328-5B7A-49DE-B18C-A35433B05786",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6250-m-sc-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13EC9806-5F4F-4A96-9607-722276398C4F",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6250-m-sc-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53C5E9BB-7EF9-4D5E-A434-7F7CDD6C6C90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6250-m-sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42D24DED-96E6-495C-AC03-9E36C37D7B60",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6250-m-sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF3E455-E2B1-4547-8CB5-9B9E3B689BCE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6250-s-sc-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F77279B-C8F7-4123-A023-05823BCDA184",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6250-s-sc-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E65B1BFE-2337-4150-A705-DF2F21DAD021",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6250-s-sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39532E63-E5C6-48E0-B24D-232DD357EC7A",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6250-s-sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "013C4153-1F2C-4F3A-8886-DF5053254FB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6250-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBD1F360-F239-499E-9CE3-86653591E31F",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6250-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC9EC01-08EC-4A3A-ABEE-83ABF35D7537",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6250_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BAE00C-AA7E-4733-8078-FDBE8717A3EB",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBCBBE08-DDC4-454D-9AD9-1C08524FC017",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6450-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5550B964-5B2E-47C9-A725-95E0E582E1BE",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6450-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF9CB11F-FBC0-4068-98FE-94C03CCB858A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6450_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9091D8D0-5D6B-4DA4-B822-4199F9E583D7",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A95FA12B-162D-4DD5-99AE-3E4545B644E8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6610-16-48v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BCFD072-719A-4296-A3E4-E83B29256EED",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6610-16-48v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE5EF2FD-FFB6-47EF-AD27-4103ED4C3F72",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6610-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B375BF55-9F72-4781-8FCE-7D9FD728431D",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6610-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADC8B97-BDA5-4E31-A4E9-3EC4CE2D9B56",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6610-32-48v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C431ADF-39CC-43DB-A19C-9B16173F02C6",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6610-32-48v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "040EAB3F-AD86-4B57-A713-82D01142EF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6610-32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3095C7F3-1095-43ED-9ED5-0B53CB208246",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6610-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DB4C67-D931-4130-98F5-718474DFDB90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6610-8-48v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1EFD832-207F-4121-A3CD-9FFBB447002E",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6610-8-48v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05F3F72C-9EB8-4A6F-9510-14B14F455068",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6610-8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0618A66-F8AD-48EE-B68F-8B25E2238749",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6610-8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C4D93B7-76EB-4E2D-8A4D-F5679C6FA8E8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-16-48v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FDDDA7-29C3-4811-B126-C305D7979A3F",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-16-48v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98728458-E791-4A0E-BD0E-3E8A18D2936D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-16-hv-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE92C0F9-8900-4F9F-8FE2-018D399EE6B8",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-16-hv-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "161575B4-0DB8-475A-9B36-3C1271F2A0B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-16-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11BBE9AD-898B-43BC-AED3-B9C5ACDA19C9",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-16-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB86D88-E0F2-43A5-BBBA-2D91F7BABD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F690542-6577-4CB9-987D-C56757563C9A",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12270C4F-FBB5-413F-BDB0-2DE57C5633F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-32-48v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A01B386A-997C-4ED2-BB2F-39E421890240",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-32-48v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32764C13-67F4-47CD-A7AE-5E14A17A2004",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-32-hv-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8D2048-4E5B-478C-B27B-F51C5B64B14B",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-32-hv-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "846D712E-9596-4834-BCD8-C134E5476246",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FD01E0-8FFF-4245-B562-655A94EBCCAE",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96FC32AA-F365-45D3-B405-0BB786AE8CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-8-48v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EC6082-8FEC-497A-8EE2-585ACB7FD479",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-8-48v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BECCFBC-6D37-4C69-8491-06B631501330",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-8-hv-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB123383-CD02-4CD1-8B77-1AC1D195DE54",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-8-hv-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D87ECB6C-1518-42AD-95D9-D70FD5D2BC7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-8-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B911B8C5-5733-4B2F-8D14-C9A7D1D15250",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-8-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3BC9725-C9CA-4505-89A9-CF26B7306F9F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68E99009-D953-43FF-8EB8-9062B94245CA",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "056C16AB-1EDC-4F42-96C5-14C3C9756857",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service. \n"
    },
    {
      "lang": "es",
      "value": "Se ha identificado una vulnerabilidad en Series NPort 6000 que hace vulnerable el mecanismo de autenticaci\u00f3n. Esta vulnerabilidad surge de la implementaci\u00f3n incorrecta de la protecci\u00f3n de informaci\u00f3n confidencial, lo que potencialmente permite que usuarios malintencionados obtengan acceso no autorizado al servicio web."
    }
  ],
  "id": "CVE-2023-5627",
  "lastModified": "2024-11-21T08:42:08.887",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "psirt@moxa.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-01T16:15:08.790",
  "references": [
    {
      "source": "psirt@moxa.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-232905-nport-6000-series-incorrect-implementation-of-authentication-algorithm-vulnerability"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-232905-nport-6000-series-incorrect-implementation-of-authentication-algorithm-vulnerability"
    }
  ],
  "sourceIdentifier": "psirt@moxa.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-257"
        },
        {
          "lang": "en",
          "value": "CWE-303"
        },
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "psirt@moxa.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        },
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2023-5627 (GCVE-0-2023-5627)
Vulnerability from cvelistv5
Published
2023-11-01 15:04
Modified
2024-09-05 15:45
CWE
  • CWE-303 - Incorrect Implementation of Authentication Algorithm
  • CWE-257 - Storing Passwords in a Recoverable Format
  • CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Summary
A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service.
Impacted products
Vendor Product Version
Moxa NPort 6000 Series Version: 1.0   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:07:32.397Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-232905-nport-6000-series-incorrect-implementation-of-authentication-algorithm-vulnerability"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:moxa:nport_6000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nport_6000",
            "vendor": "moxa",
            "versions": [
              {
                "lessThanOrEqual": "1.21",
                "status": "affected",
                "version": "1.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-5627",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-05T15:42:46.805202Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-05T15:45:44.046Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "NPort 6000 Series",
          "vendor": "Moxa",
          "versions": [
            {
              "lessThanOrEqual": "1.21",
              "status": "affected",
              "version": "1.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Pasha Kravtsov and Nathan Nye from True Anomaly (trueanomaly.space)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service. \u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service. \n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-114",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-114: Authentication Abuse"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-303",
              "description": "CWE-303: Incorrect Implementation of Authentication Algorithm",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-257",
              "description": "CWE-257: Storing Passwords in a Recoverable Format",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-327",
              "description": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-01T15:04:13.625Z",
        "orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
        "shortName": "Moxa"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-232905-nport-6000-series-incorrect-implementation-of-authentication-algorithm-vulnerability"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The vulnerability has been addressed in FWR v2.0 and subsequent versions;  it does NOT exist in these firmware versions.\u003cbr\u003e\u003cp\u003eFor the users still using version v1.x, refer to the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.moxa.com/en/products/industrial-edge-connectivity/serial-device-servers/terminal-servers/nport-6100-6200-series#resources\"\u003eHardening Guide\u003c/a\u003e on Moxa\u2019s website to:\u003c/p\u003e\u003cul\u003e\u003cli\u003eUpgrade to the newest firmware version.\u003c/li\u003e\u003cli\u003eDisable the HTTP console.\u003c/li\u003e\u003c/ul\u003e"
            }
          ],
          "value": "The vulnerability has been addressed in FWR v2.0 and subsequent versions;  it does NOT exist in these firmware versions.\nFor the users still using version v1.x, refer to the  Hardening Guide https://www.moxa.com/en/products/industrial-edge-connectivity/serial-device-servers/terminal-servers/nport-6100-6200-series#resources  on Moxa\u2019s website to:\n\n  *  Upgrade to the newest firmware version.\n  *  Disable the HTTP console.\n\n\n"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Incorrect Implementation of Authentication Algorithm Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
    "assignerShortName": "Moxa",
    "cveId": "CVE-2023-5627",
    "datePublished": "2023-11-01T15:04:13.625Z",
    "dateReserved": "2023-10-18T00:52:37.461Z",
    "dateUpdated": "2024-09-05T15:45:44.046Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}