Vulnerabilites related to moxa - nport_p5110a
Vulnerability from fkie_nvd
Published
2017-02-13 21:59
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Buffer overflow vulnerability may allow an unauthenticated attacker to remotely execute arbitrary code.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8B36FF8-808A-4BFB-BF3E-C454449EC761", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D28B00-C0BD-4B70-B871-9D18F37DCBE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "747C55F4-D7CF-418B-BAFB-64CE71F4DD63", "versionEndIncluding": "3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5507650-F3BF-45AF-AA54-06CF3EAF7DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD7B68B-128D-4AB0-AE9E-A8B9329D67C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24577B4-5E3C-4727-8A50-EA3C33401636", "versionEndIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*", "matchCriteriaId": "18402F31-34ED-431B-A9D3-1EDC546B9381", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*", "matchCriteriaId": "A98BEE65-958C-45B0-915B-BEB39E356CBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*", "matchCriteriaId": "C40A47B2-55B7-43E3-9E01-34CB57D16267", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1D65E4-3836-41FC-9F06-A78D7D0AB2EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5834C0C2-0C1F-40AA-BBE8-1A01E10A43AD", "versionEndIncluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD9C3024-D682-4C4E-AF88-29F9FEA8AF12", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A398369-6E35-492C-9D85-6564B030E858", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF39890-7A93-43EA-964C-3AE5B747E0E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*", "matchCriteriaId": "38683F12-3FFD-4E9F-BDBF-6AD386A59091", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E747BEA-5087-4E3C-8DFF-EFFD84FE187F", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE28734-0DC6-4150-B282-E85FA86CD3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB85377-D610-40C0-9BAA-482A6F039D31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "649F9322-D82E-4C2D-944F-748C581BF1E4", "versionEndIncluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CF626E1-EC48-4D6B-9942-035122B9A887", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6B68C29-57E5-427A-AA83-D0A44E18E468", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*", "matchCriteriaId": "6947F0B7-12D9-47B7-BABD-3579D620EC4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76059B73-20B0-4BF5-BAD9-A1D00F9DACAD", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A659CBC-2A65-46AB-ACED-2C5EFC17BE71", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC23CCC6-A408-452A-96F2-046662551832", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*", "matchCriteriaId": "184129E6-9A9C-49BB-AE95-D0CEC1C5EBF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB976330-9062-48C3-9ED9-0B696CB778AC", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF26B8A9-FDC5-4634-B341-7C6F2E1BCBF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AF38EB9-EFE7-4A1B-94D7-5E5011FFBBA0", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B39317-D97B-4E9B-A6C3-B006B7A078F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*", "matchCriteriaId": "23518919-EAD2-43B9-91EB-946C044073F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED314ED8-2665-44F4-9FFF-940547392B6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8233CDC-98F0-46F3-AB55-DC7DEF9630AB", "versionEndIncluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "647275A0-6F25-4002-AE26-5F8397159FB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "0908C5BA-5568-4612-A96B-3869979FCB83", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9152230A-AC8C-4B43-99A9-6AF4C26CE4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E919D3F5-12E4-42F4-BE48-D426240BE2AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DCA3A9-CEF1-493F-89EB-B39275906E32", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1FDA9E-2D80-4407-94F6-6787EB605E37", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "479014A6-4878-4372-82F9-9274FC90F487", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "968A147A-9E5C-46E3-AE27-155EF7332D60", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C16DCC-6489-43D8-96BF-4F4D10561956", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "41216A7C-065A-4022-9ECD-35052C033C24", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D5BE975-D504-4F21-BC05-F5087F9BAD57", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD728AD5-D527-4A88-B80E-C278E9369AA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7383E19A-8524-4CF0-8E6A-D6598BFBBEBF", "versionEndIncluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADBF536-3320-4F38-BF68-CC69EEB07454", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B68B983-04C3-494A-9B1B-BB57A456E3FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DAE50DD-65CC-467E-878C-6EC68BF1743B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0D45D46-9160-43D3-9D94-407127CDC184", "versionEndIncluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "87373328-5B7A-49DE-B18C-A35433B05786", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "16561579-3023-4987-BA2D-510E7F702F95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Buffer overflow vulnerability may allow an unauthenticated attacker to remotely execute arbitrary code." }, { "lang": "es", "value": "Ha sido descubierto un problema en Moxa NPort 5110 versiones anteriores a 2.6, NPort 5130/5150 Series versiones anteriores a 3.6, NPort 5200 Series versiones anteriores a 2.8, NPort 5400 Series versiones anteriores a 3.11, NPort 5600 Series versiones anteriores a 3.7, NPort 5100A Series \u0026 NPort P5150A versiones anteriores a 1.3, NPort 5200A Series versiones anteriores a 1.3, NPort 5150AI-M12 Series versiones anteriores a 1.2, NPort 5250AI-M12 Series versiones anteriores a 1.2, NPort 5450AI-M12 Series versiones anteriores a 1.2, NPort 5600-8-DT Series versiones anteriores a 2.4, NPort 5600-8-DTL Series versiones anteriores a 2.4, NPort 6x50 Series versiones anteriores a 1.13.11, NPort IA5450A versiones anteriores a v1.4. Una vulnerabilidad de desbordamiento de b\u00fafer puede permitir que un atacante no autenticado ejecute remotamente c\u00f3digo arbitrario." } ], "id": "CVE-2016-9363", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-13T21:59:02.143", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-13 21:59
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8B36FF8-808A-4BFB-BF3E-C454449EC761", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D28B00-C0BD-4B70-B871-9D18F37DCBE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "747C55F4-D7CF-418B-BAFB-64CE71F4DD63", "versionEndIncluding": "3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5507650-F3BF-45AF-AA54-06CF3EAF7DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD7B68B-128D-4AB0-AE9E-A8B9329D67C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24577B4-5E3C-4727-8A50-EA3C33401636", "versionEndIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*", "matchCriteriaId": "18402F31-34ED-431B-A9D3-1EDC546B9381", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*", "matchCriteriaId": "A98BEE65-958C-45B0-915B-BEB39E356CBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*", "matchCriteriaId": "C40A47B2-55B7-43E3-9E01-34CB57D16267", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1D65E4-3836-41FC-9F06-A78D7D0AB2EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5834C0C2-0C1F-40AA-BBE8-1A01E10A43AD", "versionEndIncluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD9C3024-D682-4C4E-AF88-29F9FEA8AF12", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A398369-6E35-492C-9D85-6564B030E858", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF39890-7A93-43EA-964C-3AE5B747E0E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*", "matchCriteriaId": "38683F12-3FFD-4E9F-BDBF-6AD386A59091", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E747BEA-5087-4E3C-8DFF-EFFD84FE187F", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE28734-0DC6-4150-B282-E85FA86CD3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB85377-D610-40C0-9BAA-482A6F039D31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "649F9322-D82E-4C2D-944F-748C581BF1E4", "versionEndIncluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CF626E1-EC48-4D6B-9942-035122B9A887", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6B68C29-57E5-427A-AA83-D0A44E18E468", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*", "matchCriteriaId": "6947F0B7-12D9-47B7-BABD-3579D620EC4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76059B73-20B0-4BF5-BAD9-A1D00F9DACAD", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A659CBC-2A65-46AB-ACED-2C5EFC17BE71", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC23CCC6-A408-452A-96F2-046662551832", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*", "matchCriteriaId": "184129E6-9A9C-49BB-AE95-D0CEC1C5EBF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB976330-9062-48C3-9ED9-0B696CB778AC", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF26B8A9-FDC5-4634-B341-7C6F2E1BCBF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AF38EB9-EFE7-4A1B-94D7-5E5011FFBBA0", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B39317-D97B-4E9B-A6C3-B006B7A078F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*", "matchCriteriaId": "23518919-EAD2-43B9-91EB-946C044073F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED314ED8-2665-44F4-9FFF-940547392B6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8233CDC-98F0-46F3-AB55-DC7DEF9630AB", "versionEndIncluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "647275A0-6F25-4002-AE26-5F8397159FB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "0908C5BA-5568-4612-A96B-3869979FCB83", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9152230A-AC8C-4B43-99A9-6AF4C26CE4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E919D3F5-12E4-42F4-BE48-D426240BE2AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DCA3A9-CEF1-493F-89EB-B39275906E32", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1FDA9E-2D80-4407-94F6-6787EB605E37", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "479014A6-4878-4372-82F9-9274FC90F487", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "968A147A-9E5C-46E3-AE27-155EF7332D60", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C16DCC-6489-43D8-96BF-4F4D10561956", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "41216A7C-065A-4022-9ECD-35052C033C24", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D5BE975-D504-4F21-BC05-F5087F9BAD57", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD728AD5-D527-4A88-B80E-C278E9369AA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7383E19A-8524-4CF0-8E6A-D6598BFBBEBF", "versionEndIncluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADBF536-3320-4F38-BF68-CC69EEB07454", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B68B983-04C3-494A-9B1B-BB57A456E3FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DAE50DD-65CC-467E-878C-6EC68BF1743B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0D45D46-9160-43D3-9D94-407127CDC184", "versionEndIncluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "87373328-5B7A-49DE-B18C-A35433B05786", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "16561579-3023-4987-BA2D-510E7F702F95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating." }, { "lang": "es", "value": "Ha sido descubierto un problema en Moxa NPort 5110 versiones anteriores a 2.6, NPort 5130/5150 Series versiones anteriores a 3.6, NPort 5200 Series versiones anteriores a 2.8, NPort 5400 Series versiones anteriores a 3.11, NPort 5600 Series versiones anteriores a 3.7, NPort 5100A Series \u0026 NPort P5150A versiones anteriores a 1.3, NPort 5200A Series versiones anteriores a 1.3, NPort 5150AI-M12 Series versiones anteriores a 1.2, NPort 5250AI-M12 Series versiones anteriores a 1.2, NPort 5450AI-M12 Series versiones anteriores a 1.2, NPort 5600-8-DT Series versiones anteriores a 2.4, NPort 5600-8-DTL Series versiones anteriores a 2.4, NPort 6x50 Series versiones anteriores a 1.13.11, NPort IA5450A versiones anteriores a v1.4. Las contrase\u00f1as de administraci\u00f3n se pueden volver a intentar sin autenticar." } ], "id": "CVE-2016-9361", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-13T21:59:02.080", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-13 21:59
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Requests are not verified to be intentionally submitted by the proper user (CROSS-SITE REQUEST FORGERY).
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8B36FF8-808A-4BFB-BF3E-C454449EC761", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D28B00-C0BD-4B70-B871-9D18F37DCBE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "747C55F4-D7CF-418B-BAFB-64CE71F4DD63", "versionEndIncluding": "3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5507650-F3BF-45AF-AA54-06CF3EAF7DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD7B68B-128D-4AB0-AE9E-A8B9329D67C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24577B4-5E3C-4727-8A50-EA3C33401636", "versionEndIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*", "matchCriteriaId": "18402F31-34ED-431B-A9D3-1EDC546B9381", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*", "matchCriteriaId": "A98BEE65-958C-45B0-915B-BEB39E356CBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*", "matchCriteriaId": "C40A47B2-55B7-43E3-9E01-34CB57D16267", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1D65E4-3836-41FC-9F06-A78D7D0AB2EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5834C0C2-0C1F-40AA-BBE8-1A01E10A43AD", "versionEndIncluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD9C3024-D682-4C4E-AF88-29F9FEA8AF12", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A398369-6E35-492C-9D85-6564B030E858", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF39890-7A93-43EA-964C-3AE5B747E0E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*", "matchCriteriaId": "38683F12-3FFD-4E9F-BDBF-6AD386A59091", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E747BEA-5087-4E3C-8DFF-EFFD84FE187F", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE28734-0DC6-4150-B282-E85FA86CD3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB85377-D610-40C0-9BAA-482A6F039D31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "649F9322-D82E-4C2D-944F-748C581BF1E4", "versionEndIncluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CF626E1-EC48-4D6B-9942-035122B9A887", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6B68C29-57E5-427A-AA83-D0A44E18E468", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*", "matchCriteriaId": "6947F0B7-12D9-47B7-BABD-3579D620EC4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76059B73-20B0-4BF5-BAD9-A1D00F9DACAD", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A659CBC-2A65-46AB-ACED-2C5EFC17BE71", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC23CCC6-A408-452A-96F2-046662551832", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*", "matchCriteriaId": "184129E6-9A9C-49BB-AE95-D0CEC1C5EBF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB976330-9062-48C3-9ED9-0B696CB778AC", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF26B8A9-FDC5-4634-B341-7C6F2E1BCBF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AF38EB9-EFE7-4A1B-94D7-5E5011FFBBA0", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B39317-D97B-4E9B-A6C3-B006B7A078F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*", "matchCriteriaId": "23518919-EAD2-43B9-91EB-946C044073F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED314ED8-2665-44F4-9FFF-940547392B6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8233CDC-98F0-46F3-AB55-DC7DEF9630AB", "versionEndIncluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "647275A0-6F25-4002-AE26-5F8397159FB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "0908C5BA-5568-4612-A96B-3869979FCB83", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9152230A-AC8C-4B43-99A9-6AF4C26CE4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E919D3F5-12E4-42F4-BE48-D426240BE2AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DCA3A9-CEF1-493F-89EB-B39275906E32", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1FDA9E-2D80-4407-94F6-6787EB605E37", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "479014A6-4878-4372-82F9-9274FC90F487", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "968A147A-9E5C-46E3-AE27-155EF7332D60", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C16DCC-6489-43D8-96BF-4F4D10561956", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "41216A7C-065A-4022-9ECD-35052C033C24", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D5BE975-D504-4F21-BC05-F5087F9BAD57", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD728AD5-D527-4A88-B80E-C278E9369AA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7383E19A-8524-4CF0-8E6A-D6598BFBBEBF", "versionEndIncluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADBF536-3320-4F38-BF68-CC69EEB07454", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B68B983-04C3-494A-9B1B-BB57A456E3FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DAE50DD-65CC-467E-878C-6EC68BF1743B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0D45D46-9160-43D3-9D94-407127CDC184", "versionEndIncluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "87373328-5B7A-49DE-B18C-A35433B05786", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "16561579-3023-4987-BA2D-510E7F702F95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Requests are not verified to be intentionally submitted by the proper user (CROSS-SITE REQUEST FORGERY)." }, { "lang": "es", "value": "Ha sido descubierto un problema en Moxa NPort 5110 versiones anteriores a 2.6, NPort 5130/5150 Series versiones anteriores a 3.6, NPort 5200 Series versiones anteriores a 2.8, NPort 5400 Series versiones anteriores a 3.11, NPort 5600 Series versiones anteriores a 3.7, NPort 5100A Series \u0026 NPort P5150A versiones anteriores a 1.3, NPort 5200A Series versiones anteriores a 1.3, NPort 5150AI-M12 Series versiones anteriores a 1.2, NPort 5250AI-M12 Series versiones anteriores a 1.2, NPort 5450AI-M12 Series versiones anteriores a 1.2, NPort 5600-8-DT Series versiones anteriores a 2.4, NPort 5600-8-DTL Series versiones anteriores a 2.4, NPort 6x50 Series versiones anteriores a 1.13.11, NPort IA5450A versiones anteriores a v1.4. Peticiones no son verificadas para ser presentadas intencionadamente por el usuario apropiado (CSRF)." } ], "id": "CVE-2016-9365", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-13T21:59:02.207", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-13 21:59
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8B36FF8-808A-4BFB-BF3E-C454449EC761", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D28B00-C0BD-4B70-B871-9D18F37DCBE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "747C55F4-D7CF-418B-BAFB-64CE71F4DD63", "versionEndIncluding": "3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5507650-F3BF-45AF-AA54-06CF3EAF7DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD7B68B-128D-4AB0-AE9E-A8B9329D67C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24577B4-5E3C-4727-8A50-EA3C33401636", "versionEndIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*", "matchCriteriaId": "18402F31-34ED-431B-A9D3-1EDC546B9381", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*", "matchCriteriaId": "A98BEE65-958C-45B0-915B-BEB39E356CBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*", "matchCriteriaId": "C40A47B2-55B7-43E3-9E01-34CB57D16267", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1D65E4-3836-41FC-9F06-A78D7D0AB2EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5834C0C2-0C1F-40AA-BBE8-1A01E10A43AD", "versionEndIncluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD9C3024-D682-4C4E-AF88-29F9FEA8AF12", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A398369-6E35-492C-9D85-6564B030E858", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF39890-7A93-43EA-964C-3AE5B747E0E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*", "matchCriteriaId": "38683F12-3FFD-4E9F-BDBF-6AD386A59091", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E747BEA-5087-4E3C-8DFF-EFFD84FE187F", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE28734-0DC6-4150-B282-E85FA86CD3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB85377-D610-40C0-9BAA-482A6F039D31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "649F9322-D82E-4C2D-944F-748C581BF1E4", "versionEndIncluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CF626E1-EC48-4D6B-9942-035122B9A887", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6B68C29-57E5-427A-AA83-D0A44E18E468", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*", "matchCriteriaId": "6947F0B7-12D9-47B7-BABD-3579D620EC4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76059B73-20B0-4BF5-BAD9-A1D00F9DACAD", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A659CBC-2A65-46AB-ACED-2C5EFC17BE71", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC23CCC6-A408-452A-96F2-046662551832", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*", "matchCriteriaId": "184129E6-9A9C-49BB-AE95-D0CEC1C5EBF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB976330-9062-48C3-9ED9-0B696CB778AC", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF26B8A9-FDC5-4634-B341-7C6F2E1BCBF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AF38EB9-EFE7-4A1B-94D7-5E5011FFBBA0", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B39317-D97B-4E9B-A6C3-B006B7A078F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*", "matchCriteriaId": "23518919-EAD2-43B9-91EB-946C044073F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED314ED8-2665-44F4-9FFF-940547392B6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8233CDC-98F0-46F3-AB55-DC7DEF9630AB", "versionEndIncluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "647275A0-6F25-4002-AE26-5F8397159FB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "0908C5BA-5568-4612-A96B-3869979FCB83", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9152230A-AC8C-4B43-99A9-6AF4C26CE4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E919D3F5-12E4-42F4-BE48-D426240BE2AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DCA3A9-CEF1-493F-89EB-B39275906E32", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1FDA9E-2D80-4407-94F6-6787EB605E37", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "479014A6-4878-4372-82F9-9274FC90F487", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "968A147A-9E5C-46E3-AE27-155EF7332D60", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C16DCC-6489-43D8-96BF-4F4D10561956", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "41216A7C-065A-4022-9ECD-35052C033C24", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D5BE975-D504-4F21-BC05-F5087F9BAD57", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD728AD5-D527-4A88-B80E-C278E9369AA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7383E19A-8524-4CF0-8E6A-D6598BFBBEBF", "versionEndIncluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADBF536-3320-4F38-BF68-CC69EEB07454", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B68B983-04C3-494A-9B1B-BB57A456E3FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DAE50DD-65CC-467E-878C-6EC68BF1743B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0D45D46-9160-43D3-9D94-407127CDC184", "versionEndIncluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "87373328-5B7A-49DE-B18C-A35433B05786", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "16561579-3023-4987-BA2D-510E7F702F95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution." }, { "lang": "es", "value": "Ha sido descubierto un problema en Moxa NPort 5110 versiones anteriores a 2.6, NPort 5130/5150 Series versiones anteriores a 3.6, NPort 5200 Series versiones anteriores a 2.8, NPort 5400 Series versiones anteriores a 3.11, NPort 5600 Series versiones anteriores a 3.7, NPort 5100A Series \u0026 NPort P5150A versiones anteriores a 1.3, NPort 5200A Series versiones anteriores a 1.3, NPort 5150AI-M12 Series versiones anteriores a 1.2, NPort 5250AI-M12 Series versiones anteriores a 1.2, NPort 5450AI-M12 Series versiones anteriores a 1.2, NPort 5600-8-DT Series versiones anteriores a 2.4, NPort 5600-8-DTL Series versiones anteriores a 2.4, NPort 6x50 Series versiones anteriores a 1.13.11, NPort IA5450A versiones anteriores a v1.4. El firmware puede ser actualizado a trav\u00e9s de la red sin autenticaci\u00f3n, lo que puede permitir la ejecuci\u00f3n remota de c\u00f3digo." } ], "id": "CVE-2016-9369", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-13T21:59:02.300", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-13 21:59
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. The amount of resources requested by a malicious actor is not restricted, leading to a denial-of-service caused by resource exhaustion.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8B36FF8-808A-4BFB-BF3E-C454449EC761", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D28B00-C0BD-4B70-B871-9D18F37DCBE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "747C55F4-D7CF-418B-BAFB-64CE71F4DD63", "versionEndIncluding": "3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5507650-F3BF-45AF-AA54-06CF3EAF7DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD7B68B-128D-4AB0-AE9E-A8B9329D67C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24577B4-5E3C-4727-8A50-EA3C33401636", "versionEndIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*", "matchCriteriaId": "18402F31-34ED-431B-A9D3-1EDC546B9381", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*", "matchCriteriaId": "A98BEE65-958C-45B0-915B-BEB39E356CBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*", "matchCriteriaId": "C40A47B2-55B7-43E3-9E01-34CB57D16267", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1D65E4-3836-41FC-9F06-A78D7D0AB2EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5834C0C2-0C1F-40AA-BBE8-1A01E10A43AD", "versionEndIncluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD9C3024-D682-4C4E-AF88-29F9FEA8AF12", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A398369-6E35-492C-9D85-6564B030E858", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF39890-7A93-43EA-964C-3AE5B747E0E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*", "matchCriteriaId": "38683F12-3FFD-4E9F-BDBF-6AD386A59091", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E747BEA-5087-4E3C-8DFF-EFFD84FE187F", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE28734-0DC6-4150-B282-E85FA86CD3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB85377-D610-40C0-9BAA-482A6F039D31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "649F9322-D82E-4C2D-944F-748C581BF1E4", "versionEndIncluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CF626E1-EC48-4D6B-9942-035122B9A887", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6B68C29-57E5-427A-AA83-D0A44E18E468", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*", "matchCriteriaId": "6947F0B7-12D9-47B7-BABD-3579D620EC4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76059B73-20B0-4BF5-BAD9-A1D00F9DACAD", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A659CBC-2A65-46AB-ACED-2C5EFC17BE71", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC23CCC6-A408-452A-96F2-046662551832", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*", "matchCriteriaId": "184129E6-9A9C-49BB-AE95-D0CEC1C5EBF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB976330-9062-48C3-9ED9-0B696CB778AC", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF26B8A9-FDC5-4634-B341-7C6F2E1BCBF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AF38EB9-EFE7-4A1B-94D7-5E5011FFBBA0", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B39317-D97B-4E9B-A6C3-B006B7A078F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*", "matchCriteriaId": "23518919-EAD2-43B9-91EB-946C044073F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED314ED8-2665-44F4-9FFF-940547392B6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8233CDC-98F0-46F3-AB55-DC7DEF9630AB", "versionEndIncluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "647275A0-6F25-4002-AE26-5F8397159FB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "0908C5BA-5568-4612-A96B-3869979FCB83", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9152230A-AC8C-4B43-99A9-6AF4C26CE4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E919D3F5-12E4-42F4-BE48-D426240BE2AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DCA3A9-CEF1-493F-89EB-B39275906E32", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1FDA9E-2D80-4407-94F6-6787EB605E37", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "479014A6-4878-4372-82F9-9274FC90F487", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "968A147A-9E5C-46E3-AE27-155EF7332D60", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C16DCC-6489-43D8-96BF-4F4D10561956", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "41216A7C-065A-4022-9ECD-35052C033C24", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D5BE975-D504-4F21-BC05-F5087F9BAD57", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD728AD5-D527-4A88-B80E-C278E9369AA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7383E19A-8524-4CF0-8E6A-D6598BFBBEBF", "versionEndIncluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADBF536-3320-4F38-BF68-CC69EEB07454", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B68B983-04C3-494A-9B1B-BB57A456E3FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DAE50DD-65CC-467E-878C-6EC68BF1743B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0D45D46-9160-43D3-9D94-407127CDC184", "versionEndIncluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "87373328-5B7A-49DE-B18C-A35433B05786", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "16561579-3023-4987-BA2D-510E7F702F95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. The amount of resources requested by a malicious actor is not restricted, leading to a denial-of-service caused by resource exhaustion." }, { "lang": "es", "value": "Ha sido descubierto un problema en Moxa NPort 5110 versiones anteriores a 2.6, NPort 5130/5150 Series versiones anteriores a 3.6, NPort 5200 Series versiones anteriores a 2.8, NPort 5400 Series versiones anteriores a 3.11, NPort 5600 Series versiones anteriores a 3.7, NPort 5100A Series \u0026 NPort P5150A versiones anteriores a 1.3, NPort 5200A Series versiones anteriores a 1.3, NPort 5150AI-M12 Series versiones anteriores a 1.2, NPort 5250AI-M12 Series versiones anteriores a 1.2, NPort 5450AI-M12 Series versiones anteriores a 1.2, NPort 5600-8-DT Series versiones anteriores a 2.4, NPort 5600-8-DTL Series versiones anteriores a 2.4, NPort 6x50 Series versiones anteriores a 1.13.11, NPort IA5450A versiones anteriores a v1.4. La cantidad de recursos solicitada por un actor malicioso no est\u00e1 restringida, conduciendo a una denegaci\u00f3n de servicio provocada por el agotamiento de recursos." } ], "id": "CVE-2016-9367", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-13T21:59:02.267", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-13 21:59
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. A configuration file contains parameters that represent passwords in plaintext.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8B36FF8-808A-4BFB-BF3E-C454449EC761", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D28B00-C0BD-4B70-B871-9D18F37DCBE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "747C55F4-D7CF-418B-BAFB-64CE71F4DD63", "versionEndIncluding": "3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5507650-F3BF-45AF-AA54-06CF3EAF7DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD7B68B-128D-4AB0-AE9E-A8B9329D67C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24577B4-5E3C-4727-8A50-EA3C33401636", "versionEndIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*", "matchCriteriaId": "18402F31-34ED-431B-A9D3-1EDC546B9381", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*", "matchCriteriaId": "A98BEE65-958C-45B0-915B-BEB39E356CBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*", "matchCriteriaId": "C40A47B2-55B7-43E3-9E01-34CB57D16267", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1D65E4-3836-41FC-9F06-A78D7D0AB2EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5834C0C2-0C1F-40AA-BBE8-1A01E10A43AD", "versionEndIncluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD9C3024-D682-4C4E-AF88-29F9FEA8AF12", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A398369-6E35-492C-9D85-6564B030E858", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF39890-7A93-43EA-964C-3AE5B747E0E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*", "matchCriteriaId": "38683F12-3FFD-4E9F-BDBF-6AD386A59091", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E747BEA-5087-4E3C-8DFF-EFFD84FE187F", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE28734-0DC6-4150-B282-E85FA86CD3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB85377-D610-40C0-9BAA-482A6F039D31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "649F9322-D82E-4C2D-944F-748C581BF1E4", "versionEndIncluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CF626E1-EC48-4D6B-9942-035122B9A887", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6B68C29-57E5-427A-AA83-D0A44E18E468", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*", "matchCriteriaId": "6947F0B7-12D9-47B7-BABD-3579D620EC4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76059B73-20B0-4BF5-BAD9-A1D00F9DACAD", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A659CBC-2A65-46AB-ACED-2C5EFC17BE71", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC23CCC6-A408-452A-96F2-046662551832", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*", "matchCriteriaId": "184129E6-9A9C-49BB-AE95-D0CEC1C5EBF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB976330-9062-48C3-9ED9-0B696CB778AC", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF26B8A9-FDC5-4634-B341-7C6F2E1BCBF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AF38EB9-EFE7-4A1B-94D7-5E5011FFBBA0", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B39317-D97B-4E9B-A6C3-B006B7A078F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*", "matchCriteriaId": "23518919-EAD2-43B9-91EB-946C044073F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED314ED8-2665-44F4-9FFF-940547392B6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8233CDC-98F0-46F3-AB55-DC7DEF9630AB", "versionEndIncluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "647275A0-6F25-4002-AE26-5F8397159FB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "0908C5BA-5568-4612-A96B-3869979FCB83", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9152230A-AC8C-4B43-99A9-6AF4C26CE4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E919D3F5-12E4-42F4-BE48-D426240BE2AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DCA3A9-CEF1-493F-89EB-B39275906E32", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1FDA9E-2D80-4407-94F6-6787EB605E37", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "479014A6-4878-4372-82F9-9274FC90F487", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "968A147A-9E5C-46E3-AE27-155EF7332D60", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C16DCC-6489-43D8-96BF-4F4D10561956", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "41216A7C-065A-4022-9ECD-35052C033C24", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D5BE975-D504-4F21-BC05-F5087F9BAD57", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD728AD5-D527-4A88-B80E-C278E9369AA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7383E19A-8524-4CF0-8E6A-D6598BFBBEBF", "versionEndIncluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADBF536-3320-4F38-BF68-CC69EEB07454", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B68B983-04C3-494A-9B1B-BB57A456E3FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DAE50DD-65CC-467E-878C-6EC68BF1743B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0D45D46-9160-43D3-9D94-407127CDC184", "versionEndIncluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "87373328-5B7A-49DE-B18C-A35433B05786", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "16561579-3023-4987-BA2D-510E7F702F95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. A configuration file contains parameters that represent passwords in plaintext." }, { "lang": "es", "value": "Ha sido descubierto un problema en Moxa NPort 5110 versiones anteriores a 2.6, NPort 5130/5150 Series versiones anteriores a 3.6, NPort 5200 Series versiones anteriores a 2.8, NPort 5400 Series versiones anteriores a 3.11, NPort 5600 Series versiones anteriores a 3.7, NPort 5100A Series \u0026 NPort P5150A versiones anteriores a 1.3, NPort 5200A Series versiones anteriores a 1.3, NPort 5150AI-M12 Series versiones anteriores a 1.2, NPort 5250AI-M12 Series versiones anteriores a 1.2, NPort 5450AI-M12 Series versiones anteriores a 1.2, NPort 5600-8-DT Series versiones anteriores a 2.4, NPort 5600-8-DTL Series versiones anteriores a 2.4, NPort 6x50 versiones anteriores a 1.13.11, NPort IA5450A versiones anteriores a v1.4. Un archivo de configuraci\u00f3n contiene par\u00e1metros que representan contrase\u00f1as en texto plano." } ], "id": "CVE-2016-9348", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-13T21:59:01.847", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-13 21:59
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING).
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8B36FF8-808A-4BFB-BF3E-C454449EC761", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D28B00-C0BD-4B70-B871-9D18F37DCBE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "747C55F4-D7CF-418B-BAFB-64CE71F4DD63", "versionEndIncluding": "3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5507650-F3BF-45AF-AA54-06CF3EAF7DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD7B68B-128D-4AB0-AE9E-A8B9329D67C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24577B4-5E3C-4727-8A50-EA3C33401636", "versionEndIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*", "matchCriteriaId": "18402F31-34ED-431B-A9D3-1EDC546B9381", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*", "matchCriteriaId": "A98BEE65-958C-45B0-915B-BEB39E356CBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*", "matchCriteriaId": "C40A47B2-55B7-43E3-9E01-34CB57D16267", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1D65E4-3836-41FC-9F06-A78D7D0AB2EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5834C0C2-0C1F-40AA-BBE8-1A01E10A43AD", "versionEndIncluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD9C3024-D682-4C4E-AF88-29F9FEA8AF12", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A398369-6E35-492C-9D85-6564B030E858", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF39890-7A93-43EA-964C-3AE5B747E0E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*", "matchCriteriaId": "38683F12-3FFD-4E9F-BDBF-6AD386A59091", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E747BEA-5087-4E3C-8DFF-EFFD84FE187F", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE28734-0DC6-4150-B282-E85FA86CD3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB85377-D610-40C0-9BAA-482A6F039D31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "649F9322-D82E-4C2D-944F-748C581BF1E4", "versionEndIncluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CF626E1-EC48-4D6B-9942-035122B9A887", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6B68C29-57E5-427A-AA83-D0A44E18E468", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*", "matchCriteriaId": "6947F0B7-12D9-47B7-BABD-3579D620EC4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76059B73-20B0-4BF5-BAD9-A1D00F9DACAD", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A659CBC-2A65-46AB-ACED-2C5EFC17BE71", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC23CCC6-A408-452A-96F2-046662551832", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*", "matchCriteriaId": "184129E6-9A9C-49BB-AE95-D0CEC1C5EBF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB976330-9062-48C3-9ED9-0B696CB778AC", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF26B8A9-FDC5-4634-B341-7C6F2E1BCBF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AF38EB9-EFE7-4A1B-94D7-5E5011FFBBA0", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B39317-D97B-4E9B-A6C3-B006B7A078F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*", "matchCriteriaId": "23518919-EAD2-43B9-91EB-946C044073F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED314ED8-2665-44F4-9FFF-940547392B6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8233CDC-98F0-46F3-AB55-DC7DEF9630AB", "versionEndIncluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "647275A0-6F25-4002-AE26-5F8397159FB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "0908C5BA-5568-4612-A96B-3869979FCB83", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9152230A-AC8C-4B43-99A9-6AF4C26CE4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E919D3F5-12E4-42F4-BE48-D426240BE2AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DCA3A9-CEF1-493F-89EB-B39275906E32", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1FDA9E-2D80-4407-94F6-6787EB605E37", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "479014A6-4878-4372-82F9-9274FC90F487", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "968A147A-9E5C-46E3-AE27-155EF7332D60", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C16DCC-6489-43D8-96BF-4F4D10561956", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "41216A7C-065A-4022-9ECD-35052C033C24", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D5BE975-D504-4F21-BC05-F5087F9BAD57", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD728AD5-D527-4A88-B80E-C278E9369AA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7383E19A-8524-4CF0-8E6A-D6598BFBBEBF", "versionEndIncluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADBF536-3320-4F38-BF68-CC69EEB07454", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B68B983-04C3-494A-9B1B-BB57A456E3FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DAE50DD-65CC-467E-878C-6EC68BF1743B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0D45D46-9160-43D3-9D94-407127CDC184", "versionEndIncluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "87373328-5B7A-49DE-B18C-A35433B05786", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "16561579-3023-4987-BA2D-510E7F702F95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING)." }, { "lang": "es", "value": "Ha sido descubierto un problema en Moxa NPort 5110 versiones anteriores a 2.6, NPort 5130/5150 Series versiones anteriores a 3.6, NPort 5200 Series versiones anteriores a 2.8, NPort 5400 Series versiones anteriores a 3.11, NPort 5600 Series versiones anteriores a 3.7, NPort 5100A Series \u0026 NPort P5150A versiones anteriores a 1.3, NPort 5200A Series versiones anteriores a 1.3, NPort 5150AI-M12 Series versiones anteriores a 1.2, NPort 5250AI-M12 Series versiones anteriores a 1.2, NPort 5450AI-M12 Series versiones anteriores a 1.2, NPort 5600-8-DT Series versiones anteriores a 2.4, NPort 5600-8-DTL Series versiones anteriores a 2.4, NPort 6x50 Series versiones anteriores a 1.13.11, NPort IA5450A versiones anteriores a v1.4. La entrada controlada por el usuario no es neutralizada antes de ser enviada a la p\u00e1gina web (XSS)." } ], "id": "CVE-2016-9371", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-13T21:59:02.347", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-13 21:59
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85965 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8B36FF8-808A-4BFB-BF3E-C454449EC761", "versionEndIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D28B00-C0BD-4B70-B871-9D18F37DCBE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "747C55F4-D7CF-418B-BAFB-64CE71F4DD63", "versionEndIncluding": "3.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5507650-F3BF-45AF-AA54-06CF3EAF7DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD7B68B-128D-4AB0-AE9E-A8B9329D67C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A24577B4-5E3C-4727-8A50-EA3C33401636", "versionEndIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*", "matchCriteriaId": "18402F31-34ED-431B-A9D3-1EDC546B9381", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*", "matchCriteriaId": "A98BEE65-958C-45B0-915B-BEB39E356CBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*", "matchCriteriaId": "C40A47B2-55B7-43E3-9E01-34CB57D16267", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1D65E4-3836-41FC-9F06-A78D7D0AB2EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5834C0C2-0C1F-40AA-BBE8-1A01E10A43AD", "versionEndIncluding": "3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD9C3024-D682-4C4E-AF88-29F9FEA8AF12", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A398369-6E35-492C-9D85-6564B030E858", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF39890-7A93-43EA-964C-3AE5B747E0E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*", "matchCriteriaId": "38683F12-3FFD-4E9F-BDBF-6AD386A59091", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E747BEA-5087-4E3C-8DFF-EFFD84FE187F", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FE28734-0DC6-4150-B282-E85FA86CD3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB85377-D610-40C0-9BAA-482A6F039D31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "649F9322-D82E-4C2D-944F-748C581BF1E4", "versionEndIncluding": "3.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CF626E1-EC48-4D6B-9942-035122B9A887", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6B68C29-57E5-427A-AA83-D0A44E18E468", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*", "matchCriteriaId": "6947F0B7-12D9-47B7-BABD-3579D620EC4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76059B73-20B0-4BF5-BAD9-A1D00F9DACAD", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A659CBC-2A65-46AB-ACED-2C5EFC17BE71", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC23CCC6-A408-452A-96F2-046662551832", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*", "matchCriteriaId": "184129E6-9A9C-49BB-AE95-D0CEC1C5EBF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB976330-9062-48C3-9ED9-0B696CB778AC", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF26B8A9-FDC5-4634-B341-7C6F2E1BCBF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AF38EB9-EFE7-4A1B-94D7-5E5011FFBBA0", "versionEndIncluding": "1.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B39317-D97B-4E9B-A6C3-B006B7A078F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*", "matchCriteriaId": "23518919-EAD2-43B9-91EB-946C044073F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED314ED8-2665-44F4-9FFF-940547392B6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8233CDC-98F0-46F3-AB55-DC7DEF9630AB", "versionEndIncluding": "1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "647275A0-6F25-4002-AE26-5F8397159FB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "0908C5BA-5568-4612-A96B-3869979FCB83", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9152230A-AC8C-4B43-99A9-6AF4C26CE4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E919D3F5-12E4-42F4-BE48-D426240BE2AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DCA3A9-CEF1-493F-89EB-B39275906E32", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1FDA9E-2D80-4407-94F6-6787EB605E37", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "479014A6-4878-4372-82F9-9274FC90F487", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "968A147A-9E5C-46E3-AE27-155EF7332D60", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C16DCC-6489-43D8-96BF-4F4D10561956", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*", "matchCriteriaId": "41216A7C-065A-4022-9ECD-35052C033C24", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D5BE975-D504-4F21-BC05-F5087F9BAD57", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD728AD5-D527-4A88-B80E-C278E9369AA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7383E19A-8524-4CF0-8E6A-D6598BFBBEBF", "versionEndIncluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADBF536-3320-4F38-BF68-CC69EEB07454", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B68B983-04C3-494A-9B1B-BB57A456E3FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DAE50DD-65CC-467E-878C-6EC68BF1743B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0D45D46-9160-43D3-9D94-407127CDC184", "versionEndIncluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "87373328-5B7A-49DE-B18C-A35433B05786", "vulnerable": false }, { "criteria": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "16561579-3023-4987-BA2D-510E7F702F95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication." }, { "lang": "es", "value": "Ha sido descubierto un problema en Moxa NPort 5110 versiones anteriores a 2.6, NPort 5130/5150 Series versiones anteriores a 3.6, NPort 5200 Series versiones anteriores a 2.8, NPort 5400 Series versiones anteriores a 3.11, NPort 5600 Series versiones anteriores a 3.7, NPort 5100A Series \u0026 NPort P5150A versiones anteriores a 1.3, NPort 5200A Series versiones anteriores a 1.3, NPort 5150AI-M12 Series versiones anteriores a 1.2, NPort 5250AI-M12 Series versiones anteriores a 1.2, NPort 5450AI-M12 Series versiones anteriores a 1.2, NPort 5600-8-DT Series versiones anteriores a 2.4, NPort 5600-8-DTL Series versiones anteriores a 2.4, NPort 6x50 Series versiones anteriores a 1.13.11, NPort IA5450A versiones anteriores a v1.4. Un atacante puede usar libremente la fuerza bruta para determinar los par\u00e1metros necesarios para eludir la autenticaci\u00f3n." } ], "id": "CVE-2016-9366", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-13T21:59:02.253", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2016-9361 (GCVE-0-2016-9361)
Vulnerability from cvelistv5
Published
2017-02-13 21:00
Modified
2024-08-06 02:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Moxa NPort Device password retrieval
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa NPort |
Version: Moxa NPort |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:37.128Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/85965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa NPort", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa NPort" } ] } ], "datePublic": "2017-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating." } ], "problemTypes": [ { "descriptions": [ { "description": "Moxa NPort Device password retrieval", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-14T13:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/85965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-9361", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa NPort", "version": { "version_data": [ { "version_value": "Moxa NPort" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Moxa NPort Device password retrieval" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85965" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-9361", "datePublished": "2017-02-13T21:00:00", "dateReserved": "2016-11-16T00:00:00", "dateUpdated": "2024-08-06T02:50:37.128Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9348 (GCVE-0-2016-9348)
Vulnerability from cvelistv5
Published
2017-02-13 21:00
Modified
2024-08-06 02:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Moxa NPort Device passwords in plaintext
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. A configuration file contains parameters that represent passwords in plaintext.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa NPort |
Version: Moxa NPort |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:37.633Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/85965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa NPort", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa NPort" } ] } ], "datePublic": "2017-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. A configuration file contains parameters that represent passwords in plaintext." } ], "problemTypes": [ { "descriptions": [ { "description": "Moxa NPort Device passwords in plaintext", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-14T13:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/85965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-9348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa NPort", "version": { "version_data": [ { "version_value": "Moxa NPort" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. A configuration file contains parameters that represent passwords in plaintext." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Moxa NPort Device passwords in plaintext" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85965" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-9348", "datePublished": "2017-02-13T21:00:00", "dateReserved": "2016-11-16T00:00:00", "dateUpdated": "2024-08-06T02:50:37.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9371 (GCVE-0-2016-9371)
Vulnerability from cvelistv5
Published
2017-02-13 21:00
Modified
2024-08-06 02:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Moxa NPort Device XSS
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING).
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa NPort |
Version: Moxa NPort |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:37.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/85965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa NPort", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa NPort" } ] } ], "datePublic": "2017-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING)." } ], "problemTypes": [ { "descriptions": [ { "description": "Moxa NPort Device XSS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-14T13:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/85965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-9371", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa NPort", "version": { "version_data": [ { "version_value": "Moxa NPort" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Moxa NPort Device XSS" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85965" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-9371", "datePublished": "2017-02-13T21:00:00", "dateReserved": "2016-11-16T00:00:00", "dateUpdated": "2024-08-06T02:50:37.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9366 (GCVE-0-2016-9366)
Vulnerability from cvelistv5
Published
2017-02-13 21:00
Modified
2024-08-06 02:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Moxa NPort Device brute force
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa NPort |
Version: Moxa NPort |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:36.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/85965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa NPort", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa NPort" } ] } ], "datePublic": "2017-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "Moxa NPort Device brute force", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-14T13:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/85965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-9366", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa NPort", "version": { "version_data": [ { "version_value": "Moxa NPort" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Moxa NPort Device brute force" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85965" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-9366", "datePublished": "2017-02-13T21:00:00", "dateReserved": "2016-11-16T00:00:00", "dateUpdated": "2024-08-06T02:50:36.976Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9365 (GCVE-0-2016-9365)
Vulnerability from cvelistv5
Published
2017-02-13 21:00
Modified
2024-08-06 02:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Moxa NPort Device csrf
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Requests are not verified to be intentionally submitted by the proper user (CROSS-SITE REQUEST FORGERY).
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa NPort |
Version: Moxa NPort |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:36.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/85965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa NPort", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa NPort" } ] } ], "datePublic": "2017-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Requests are not verified to be intentionally submitted by the proper user (CROSS-SITE REQUEST FORGERY)." } ], "problemTypes": [ { "descriptions": [ { "description": "Moxa NPort Device csrf", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-14T13:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/85965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-9365", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa NPort", "version": { "version_data": [ { "version_value": "Moxa NPort" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Requests are not verified to be intentionally submitted by the proper user (CROSS-SITE REQUEST FORGERY)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Moxa NPort Device csrf" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85965" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-9365", "datePublished": "2017-02-13T21:00:00", "dateReserved": "2016-11-16T00:00:00", "dateUpdated": "2024-08-06T02:50:36.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9363 (GCVE-0-2016-9363)
Vulnerability from cvelistv5
Published
2017-02-13 21:00
Modified
2024-08-06 02:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Moxa NPort Buffer overflow
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Buffer overflow vulnerability may allow an unauthenticated attacker to remotely execute arbitrary code.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa NPort |
Version: Moxa NPort |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:37.048Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/85965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa NPort", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa NPort" } ] } ], "datePublic": "2017-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Buffer overflow vulnerability may allow an unauthenticated attacker to remotely execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Moxa NPort Buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-14T13:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/85965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-9363", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa NPort", "version": { "version_data": [ { "version_value": "Moxa NPort" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Buffer overflow vulnerability may allow an unauthenticated attacker to remotely execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Moxa NPort Buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85965" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-9363", "datePublished": "2017-02-13T21:00:00", "dateReserved": "2016-11-16T00:00:00", "dateUpdated": "2024-08-06T02:50:37.048Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9367 (GCVE-0-2016-9367)
Vulnerability from cvelistv5
Published
2017-02-13 21:00
Modified
2024-08-06 02:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Moxa NPort Device DoS
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. The amount of resources requested by a malicious actor is not restricted, leading to a denial-of-service caused by resource exhaustion.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa NPort |
Version: Moxa NPort |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:38.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/85965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa NPort", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa NPort" } ] } ], "datePublic": "2017-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. The amount of resources requested by a malicious actor is not restricted, leading to a denial-of-service caused by resource exhaustion." } ], "problemTypes": [ { "descriptions": [ { "description": "Moxa NPort Device DoS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-14T13:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/85965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-9367", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa NPort", "version": { "version_data": [ { "version_value": "Moxa NPort" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. The amount of resources requested by a malicious actor is not restricted, leading to a denial-of-service caused by resource exhaustion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Moxa NPort Device DoS" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85965" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-9367", "datePublished": "2017-02-13T21:00:00", "dateReserved": "2016-11-16T00:00:00", "dateUpdated": "2024-08-06T02:50:38.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9369 (GCVE-0-2016-9369)
Vulnerability from cvelistv5
Published
2017-02-13 21:00
Modified
2024-08-06 02:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Moxa NPort Device firmware spoof
Summary
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Moxa NPort |
Version: Moxa NPort |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:50:36.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/85965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moxa NPort", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Moxa NPort" } ] } ], "datePublic": "2017-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Moxa NPort Device firmware spoof", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-14T13:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/85965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2016-9369", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moxa NPort", "version": { "version_data": [ { "version_value": "Moxa NPort" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Moxa NPort Device firmware spoof" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02" }, { "name": "85965", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85965" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2016-9369", "datePublished": "2017-02-13T21:00:00", "dateReserved": "2016-11-16T00:00:00", "dateUpdated": "2024-08-06T02:50:36.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }