fkie_cve-2023-5627
Vulnerability from fkie_nvd
Published
2023-11-01 16:15
Modified
2024-11-21 08:42
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6150-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "753655A9-BC00-4D1E-B706-683591DD3D84", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "16561579-3023-4987-BA2D-510E7F702F95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6150_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05EED0A1-0FCB-4FC7-9A58-FE1D7E87E56D", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "87373328-5B7A-49DE-B18C-A35433B05786", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6250-m-sc-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13EC9806-5F4F-4A96-9607-722276398C4F", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6250-m-sc-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "53C5E9BB-7EF9-4D5E-A434-7F7CDD6C6C90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6250-m-sc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42D24DED-96E6-495C-AC03-9E36C37D7B60", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6250-m-sc:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DF3E455-E2B1-4547-8CB5-9B9E3B689BCE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6250-s-sc-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F77279B-C8F7-4123-A023-05823BCDA184", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6250-s-sc-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E65B1BFE-2337-4150-A705-DF2F21DAD021", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6250-s-sc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39532E63-E5C6-48E0-B24D-232DD357EC7A", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6250-s-sc:-:*:*:*:*:*:*:*", "matchCriteriaId": "013C4153-1F2C-4F3A-8886-DF5053254FB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6250-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBD1F360-F239-499E-9CE3-86653591E31F", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6250-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAC9EC01-08EC-4A3A-ABEE-83ABF35D7537", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6250_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9BAE00C-AA7E-4733-8078-FDBE8717A3EB", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6250:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBCBBE08-DDC4-454D-9AD9-1C08524FC017", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6450-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5550B964-5B2E-47C9-A725-95E0E582E1BE", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6450-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF9CB11F-FBC0-4068-98FE-94C03CCB858A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6450_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9091D8D0-5D6B-4DA4-B822-4199F9E583D7", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6450:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FA12B-162D-4DD5-99AE-3E4545B644E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6610-16-48v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BCFD072-719A-4296-A3E4-E83B29256EED", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6610-16-48v:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE5EF2FD-FFB6-47EF-AD27-4103ED4C3F72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6610-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B375BF55-9F72-4781-8FCE-7D9FD728431D", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6610-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ADC8B97-BDA5-4E31-A4E9-3EC4CE2D9B56", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6610-32-48v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C431ADF-39CC-43DB-A19C-9B16173F02C6", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6610-32-48v:-:*:*:*:*:*:*:*", "matchCriteriaId": "040EAB3F-AD86-4B57-A713-82D01142EF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6610-32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3095C7F3-1095-43ED-9ED5-0B53CB208246", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6610-32:-:*:*:*:*:*:*:*", "matchCriteriaId": "49DB4C67-D931-4130-98F5-718474DFDB90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6610-8-48v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1EFD832-207F-4121-A3CD-9FFBB447002E", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6610-8-48v:-:*:*:*:*:*:*:*", "matchCriteriaId": "05F3F72C-9EB8-4A6F-9510-14B14F455068", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6610-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0618A66-F8AD-48EE-B68F-8B25E2238749", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6610-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C4D93B7-76EB-4E2D-8A4D-F5679C6FA8E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6650-16-48v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04FDDDA7-29C3-4811-B126-C305D7979A3F", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6650-16-48v:-:*:*:*:*:*:*:*", "matchCriteriaId": "98728458-E791-4A0E-BD0E-3E8A18D2936D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6650-16-hv-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE92C0F9-8900-4F9F-8FE2-018D399EE6B8", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6650-16-hv-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "161575B4-0DB8-475A-9B36-3C1271F2A0B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6650-16-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11BBE9AD-898B-43BC-AED3-B9C5ACDA19C9", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6650-16-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BB86D88-E0F2-43A5-BBBA-2D91F7BABD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6650-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F690542-6577-4CB9-987D-C56757563C9A", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6650-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "12270C4F-FBB5-413F-BDB0-2DE57C5633F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6650-32-48v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A01B386A-997C-4ED2-BB2F-39E421890240", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6650-32-48v:-:*:*:*:*:*:*:*", "matchCriteriaId": "32764C13-67F4-47CD-A7AE-5E14A17A2004", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6650-32-hv-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8D2048-4E5B-478C-B27B-F51C5B64B14B", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6650-32-hv-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "846D712E-9596-4834-BCD8-C134E5476246", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6650-32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7FD01E0-8FFF-4245-B562-655A94EBCCAE", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6650-32:-:*:*:*:*:*:*:*", "matchCriteriaId": "96FC32AA-F365-45D3-B405-0BB786AE8CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6650-8-48v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8EC6082-8FEC-497A-8EE2-585ACB7FD479", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6650-8-48v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BECCFBC-6D37-4C69-8491-06B631501330", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6650-8-hv-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB123383-CD02-4CD1-8B77-1AC1D195DE54", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6650-8-hv-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D87ECB6C-1518-42AD-95D9-D70FD5D2BC7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6650-8-t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B911B8C5-5733-4B2F-8D14-C9A7D1D15250", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6650-8-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3BC9725-C9CA-4505-89A9-CF26B7306F9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:moxa:nport_6650-8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68E99009-D953-43FF-8EB8-9062B94245CA", "versionEndIncluding": "1.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:moxa:nport_6650-8:-:*:*:*:*:*:*:*", "matchCriteriaId": "056C16AB-1EDC-4F42-96C5-14C3C9756857", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service. \n" }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en Series NPort 6000 que hace vulnerable el mecanismo de autenticaci\u00f3n. Esta vulnerabilidad surge de la implementaci\u00f3n incorrecta de la protecci\u00f3n de informaci\u00f3n confidencial, lo que potencialmente permite que usuarios malintencionados obtengan acceso no autorizado al servicio web." } ], "id": "CVE-2023-5627", "lastModified": "2024-11-21T08:42:08.887", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@moxa.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-01T16:15:08.790", "references": [ { "source": "psirt@moxa.com", "tags": [ "Vendor Advisory" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-232905-nport-6000-series-incorrect-implementation-of-authentication-algorithm-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-232905-nport-6000-series-incorrect-implementation-of-authentication-algorithm-vulnerability" } ], "sourceIdentifier": "psirt@moxa.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-257" }, { "lang": "en", "value": "CWE-303" }, { "lang": "en", "value": "CWE-327" } ], "source": "psirt@moxa.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" }, { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…