{ "id": "CVE-2019-9104", "sourceIdentifier": "cve@mitre.org", "published": "2020-03-11T15:15:17.247", "lastModified": "2024-11-21T04:50:59.400", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. The application's configuration file contains parameters that represent passwords in cleartext." }, { "lang": "es", "value": "Se detect\u00f3 un problema en los dispositivos Moxa MGate MB3170 y MB3270 versiones anteriores a la versi\u00f3n 4.1, MB3280 y MB3480 versiones anteriores a la versi\u00f3n 3.1, MB3660 versiones anteriores a la versi\u00f3n 2.3, y MB3180 versiones anteriores a la versi\u00f3n 2.1. El archivo de configuraci\u00f3n de la aplicaci\u00f3n contiene par\u00e1metros que representan las contrase\u00f1as en un texto sin cifrar ." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ], "cvssMetricV30": [ { "source": "cve@mitre.org", "type": "Secondary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-312" }, { "lang": "en", "value": "CWE-522" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:mb3170_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.0", "matchCriteriaId": "AA77E3A9-35F8-46C1-B8DE-9647AFD61639" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:mb3170:-:*:*:*:*:*:*:*", "matchCriteriaId": "02331350-F101-4848-ACC8-128F71158A2B" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:mb3270_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.0", "matchCriteriaId": "320E0EA8-031F-4FB5-A31E-383CBAB1A7B7" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:mb3270:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B20B91C-1A84-4B6B-9057-ABC2374E749B" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:mb3180_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.0", "matchCriteriaId": "0627A8C8-E7D1-4005-BA45-DD5713A66974" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:mb3180:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CF26E0E-2E1A-4365-8F7D-E668A2856F57" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:mb3280_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.0", "matchCriteriaId": "DE9A7F7F-B24E-40D6-9316-1BC67A826D22" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:mb3280:-:*:*:*:*:*:*:*", "matchCriteriaId": "706A1768-5776-48CC-A4ED-1F73841C9F9A" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:mb3480_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.0", "matchCriteriaId": "21613C9B-C822-4B51-98D5-88C4A0B7F852" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:mb3480:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B9256FD-5121-4009-8672-D9637053E808" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:moxa:mb3660_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.2", "matchCriteriaId": "634112A7-C567-43E8-BB61-73779CB43C6D" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:moxa:mb3660:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DC4BC5A-4EDA-448B-B312-C9A9F906E4DC" } ] } ] } ], "references": [ { "url": "https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-01", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ] }, { "url": "https://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-01", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ] } ] }