fkie_cve-2023-5627
Vulnerability from fkie_nvd
Published
2023-11-01 16:15
Modified
2024-11-21 08:42
Summary
A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6150-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "753655A9-BC00-4D1E-B706-683591DD3D84",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16561579-3023-4987-BA2D-510E7F702F95",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6150_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EED0A1-0FCB-4FC7-9A58-FE1D7E87E56D",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87373328-5B7A-49DE-B18C-A35433B05786",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6250-m-sc-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13EC9806-5F4F-4A96-9607-722276398C4F",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6250-m-sc-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53C5E9BB-7EF9-4D5E-A434-7F7CDD6C6C90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6250-m-sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42D24DED-96E6-495C-AC03-9E36C37D7B60",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6250-m-sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF3E455-E2B1-4547-8CB5-9B9E3B689BCE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6250-s-sc-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F77279B-C8F7-4123-A023-05823BCDA184",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6250-s-sc-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E65B1BFE-2337-4150-A705-DF2F21DAD021",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6250-s-sc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39532E63-E5C6-48E0-B24D-232DD357EC7A",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6250-s-sc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "013C4153-1F2C-4F3A-8886-DF5053254FB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6250-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBD1F360-F239-499E-9CE3-86653591E31F",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6250-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC9EC01-08EC-4A3A-ABEE-83ABF35D7537",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6250_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BAE00C-AA7E-4733-8078-FDBE8717A3EB",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBCBBE08-DDC4-454D-9AD9-1C08524FC017",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6450-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5550B964-5B2E-47C9-A725-95E0E582E1BE",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6450-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF9CB11F-FBC0-4068-98FE-94C03CCB858A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6450_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9091D8D0-5D6B-4DA4-B822-4199F9E583D7",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A95FA12B-162D-4DD5-99AE-3E4545B644E8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6610-16-48v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BCFD072-719A-4296-A3E4-E83B29256EED",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6610-16-48v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE5EF2FD-FFB6-47EF-AD27-4103ED4C3F72",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6610-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B375BF55-9F72-4781-8FCE-7D9FD728431D",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6610-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADC8B97-BDA5-4E31-A4E9-3EC4CE2D9B56",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6610-32-48v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C431ADF-39CC-43DB-A19C-9B16173F02C6",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6610-32-48v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "040EAB3F-AD86-4B57-A713-82D01142EF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6610-32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3095C7F3-1095-43ED-9ED5-0B53CB208246",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6610-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DB4C67-D931-4130-98F5-718474DFDB90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6610-8-48v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1EFD832-207F-4121-A3CD-9FFBB447002E",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6610-8-48v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05F3F72C-9EB8-4A6F-9510-14B14F455068",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6610-8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0618A66-F8AD-48EE-B68F-8B25E2238749",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6610-8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C4D93B7-76EB-4E2D-8A4D-F5679C6FA8E8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-16-48v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FDDDA7-29C3-4811-B126-C305D7979A3F",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-16-48v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98728458-E791-4A0E-BD0E-3E8A18D2936D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-16-hv-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE92C0F9-8900-4F9F-8FE2-018D399EE6B8",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-16-hv-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "161575B4-0DB8-475A-9B36-3C1271F2A0B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-16-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11BBE9AD-898B-43BC-AED3-B9C5ACDA19C9",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-16-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB86D88-E0F2-43A5-BBBA-2D91F7BABD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F690542-6577-4CB9-987D-C56757563C9A",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12270C4F-FBB5-413F-BDB0-2DE57C5633F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-32-48v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A01B386A-997C-4ED2-BB2F-39E421890240",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-32-48v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32764C13-67F4-47CD-A7AE-5E14A17A2004",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-32-hv-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8D2048-4E5B-478C-B27B-F51C5B64B14B",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-32-hv-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "846D712E-9596-4834-BCD8-C134E5476246",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FD01E0-8FFF-4245-B562-655A94EBCCAE",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96FC32AA-F365-45D3-B405-0BB786AE8CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-8-48v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8EC6082-8FEC-497A-8EE2-585ACB7FD479",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-8-48v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BECCFBC-6D37-4C69-8491-06B631501330",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-8-hv-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB123383-CD02-4CD1-8B77-1AC1D195DE54",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-8-hv-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D87ECB6C-1518-42AD-95D9-D70FD5D2BC7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-8-t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B911B8C5-5733-4B2F-8D14-C9A7D1D15250",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-8-t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3BC9725-C9CA-4505-89A9-CF26B7306F9F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:moxa:nport_6650-8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68E99009-D953-43FF-8EB8-9062B94245CA",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:moxa:nport_6650-8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "056C16AB-1EDC-4F42-96C5-14C3C9756857",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service. \n"
    },
    {
      "lang": "es",
      "value": "Se ha identificado una vulnerabilidad en Series NPort 6000 que hace vulnerable el mecanismo de autenticaci\u00f3n. Esta vulnerabilidad surge de la implementaci\u00f3n incorrecta de la protecci\u00f3n de informaci\u00f3n confidencial, lo que potencialmente permite que usuarios malintencionados obtengan acceso no autorizado al servicio web."
    }
  ],
  "id": "CVE-2023-5627",
  "lastModified": "2024-11-21T08:42:08.887",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "psirt@moxa.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-01T16:15:08.790",
  "references": [
    {
      "source": "psirt@moxa.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-232905-nport-6000-series-incorrect-implementation-of-authentication-algorithm-vulnerability"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-232905-nport-6000-series-incorrect-implementation-of-authentication-algorithm-vulnerability"
    }
  ],
  "sourceIdentifier": "psirt@moxa.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-257"
        },
        {
          "lang": "en",
          "value": "CWE-303"
        },
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "psirt@moxa.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        },
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…