{ "id": "CVE-2023-5962", "sourceIdentifier": "psirt@moxa.com", "published": "2023-12-23T09:15:08.050", "lastModified": "2024-01-03T20:04:06.947", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization.\n\n" }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad de algoritmo criptogr\u00e1fico d\u00e9bil en las versiones de firmware de la serie ioLogik E1200 v3.3 y anteriores. Esta vulnerabilidad puede ayudar a un atacante a comprometer la confidencialidad de datos confidenciales. Esta vulnerabilidad puede llevar a un atacante a obtener una autorizaci\u00f3n inesperada." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 3.6 }, { "source": "psirt@moxa.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-327" } ] }, { "source": "psirt@moxa.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-327" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:iologik_e1210_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.3", "matchCriteriaId": "CF14969B-6E9F-4553-96EB-7BE6C5834260" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:iologik_e1210:-:*:*:*:*:*:*:*", "matchCriteriaId": "67DDCD42-10D5-46B2-AB91-66EF30D5D645" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:iologik_e1211_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.3", "matchCriteriaId": "D03FA4E2-4A30-4ED9-BA4D-5546FC0BA939" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:iologik_e1211:-:*:*:*:*:*:*:*", "matchCriteriaId": "308E46FB-488A-4907-9A69-AACDE23A3394" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:iologik_e1212_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.3", "matchCriteriaId": "BA133D93-4A1D-419A-92C5-C0C0A35187B5" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:iologik_e1212:-:*:*:*:*:*:*:*", "matchCriteriaId": "616E5D0B-0D3A-4808-8C15-2FDC35E8605C" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:iologik_e1213_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.3", "matchCriteriaId": "6E39755B-9625-4D95-B425-BD28B60180CA" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:iologik_e1213:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AAE4F4E-779C-401F-A75E-AC66757DD313" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:iologik_e1214_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.3", "matchCriteriaId": "F59B517D-63C4-4FE5-A89F-B2A235E8239A" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:iologik_e1214:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0837606-60F7-4563-8F80-AE7C1CC3F469" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:iologik_e1240_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.3", "matchCriteriaId": "90601A69-F749-4E68-A034-74B9F046436F" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:iologik_e1240:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A9D90D-0419-410C-AF65-0FFE0FF2882F" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:iologik_e1241_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.3", "matchCriteriaId": "38280BA6-C262-45AC-AD33-813523F64DAB" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:iologik_e1241:-:*:*:*:*:*:*:*", "matchCriteriaId": "3239D045-8A7C-4407-B77C-E82C178D8B90" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:iologik_e1242_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.3", "matchCriteriaId": "EB237801-4287-4A30-8CE8-DB90FAB5C118" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:iologik_e1242:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D40DF4C-0EA9-44B0-8D8C-D1FC2AB5A357" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:iologik_e1260_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.3", "matchCriteriaId": "ACDAE3E7-675E-44BF-BD57-BF5C31B969A5" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:iologik_e1260:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0B4FA04-BF84-4B8A-A295-0312A3790F2E" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:iologik_e1262_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.3", "matchCriteriaId": "485CCB1F-A642-48B2-A8AD-4A7EBB5791BD" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:iologik_e1262:-:*:*:*:*:*:*:*", "matchCriteriaId": "3366C39B-50FD-497B-A6A1-875CEB8913C5" } ] } ] } ], "references": [ { "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-235250-iologik-e1200-series-web-server-vulnerability", "source": "psirt@moxa.com", "tags": [ "Vendor Advisory" ] } ] }