cvelist/2025/0xxx/CVE-2025-0193.json

124 lines
6.7 KiB
JSON
Raw Normal View History

2025-01-03 09:00:56 +00:00
{
2025-01-15 12:00:54 +00:00
"data_version": "4.0",
2025-01-03 09:00:56 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2025-0193",
2025-01-15 12:00:54 +00:00
"ASSIGNER": "psirt@moxa.com",
"STATE": "PUBLIC"
2025-01-03 09:00:56 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2025-01-15 12:00:54 +00:00
"value": "A stored Cross-site Scripting (XSS) vulnerability exists in the MGate 5121/5122/5123 Series firmware version v1.0 because of insufficient sanitization and encoding of user input in the \"Login Message\" functionality. An authenticated attacker with administrative access can exploit this vulnerability to inject malicious scripts that are\u00a0continuously stored on the device. These scripts are executed when other users access the login page, potentially resulting in unauthorized actions\u00a0or other impacts,\u00a0depending on the user's privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Moxa",
"product": {
"product_data": [
{
"product_name": "MGate 5121 Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
},
{
"product_name": "MGate 5122 Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
},
{
"product_name": "MGate 5123 Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-247733-cve-2025-0193-stored-cross-site-scripting-(xss)-vulnerability-in-the-mgate-5121-5122-5123-series",
"refsource": "MISC",
"name": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-247733-cve-2025-0193-stored-cross-site-scripting-(xss)-vulnerability-in-the-mgate-5121-5122-5123-series"
2025-01-03 09:00:56 +00:00
}
]
2025-01-15 12:00:54 +00:00
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<ul><li>Minimize network exposure to ensure the device is not accessible from the Internet. </li></ul><ul><li>Ensure that administrator accounts use strong, unique passwords, and restrict access to trusted personnel only.</li></ul>"
}
],
"value": "* Minimize network exposure to ensure the device is not accessible from the Internet. \n\n\n * Ensure that administrator accounts use strong, unique passwords, and restrict access to trusted personnel only."
}
],
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<p>Moxa has developed appropriate solutions to address vulnerability. The solutions for the affected products are listed below. </p><p></p><ul><li>MGate 5121 Series: Upgrade to <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.moxa.com/en/products/industrial-edge-connectivity/protocol-gateways/modbus-tcp-gateways/mgate-5121-series#resources\">the firmware version 2.0</a>&nbsp;or later version</li><li><span style=\"background-color: var(--wht);\">MGate 5122 Series: Upgrade to </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.moxa.com/en/products/industrial-edge-connectivity/protocol-gateways/ethernet-ip-gateways/mgate-5122-series#resources\">the firmware version 2.0</a><span style=\"background-color: var(--wht);\">&nbsp;or later version</span></li><li><span style=\"background-color: var(--wht);\">MGate 5123 Series: Upgrade to </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.moxa.com/en/products/industrial-edge-connectivity/protocol-gateways/profinet-gateways/mgate-5123-series#resources\">the firmware version 2.0</a><span style=\"background-color: var(--wht);\">&nbsp;or later version</span></li></ul><p></p><br>"
}
],
"value": "Moxa has developed appropriate solutions to address vulnerability. The solutions for the affected products are listed below. \n\n\n\n * MGate 5121 Series: Upgrade to the firmware version 2.0 https://www.moxa.com/en/products/industrial-edge-connectivity/protocol-gateways/modbus-tcp-gateways/mgate-5121-series#resources \u00a0or later version\n * MGate 5122 Series: Upgrade to the firmware version 2.0 https://www.moxa.com/en/products/industrial-edge-connectivity/protocol-gateways/ethernet-ip-gateways/mgate-5122-series#resources \u00a0or later version\n * MGate 5123 Series: Upgrade to the firmware version 2.0 https://www.moxa.com/en/products/industrial-edge-connectivity/protocol-gateways/profinet-gateways/mgate-5123-series#resources \u00a0or later version"
}
],
"credits": [
{
"lang": "en",
"value": "Dmitrii Mosichkin"
}
]
2025-01-03 09:00:56 +00:00
}