2024-07-14 02:06:08 +00:00

375 lines
10 KiB
JSON

{
"id": "CVE-2023-5962",
"sourceIdentifier": "psirt@moxa.com",
"published": "2023-12-23T09:15:08.050",
"lastModified": "2024-01-03T20:04:06.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization.\n\n"
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de algoritmo criptogr\u00e1fico d\u00e9bil en las versiones de firmware de la serie ioLogik E1200 v3.3 y anteriores. Esta vulnerabilidad puede ayudar a un atacante a comprometer la confidencialidad de datos confidenciales. Esta vulnerabilidad puede llevar a un atacante a obtener una autorizaci\u00f3n inesperada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "psirt@moxa.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
},
{
"source": "psirt@moxa.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:moxa:iologik_e1210_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.3",
"matchCriteriaId": "CF14969B-6E9F-4553-96EB-7BE6C5834260"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:moxa:iologik_e1210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67DDCD42-10D5-46B2-AB91-66EF30D5D645"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:moxa:iologik_e1211_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.3",
"matchCriteriaId": "D03FA4E2-4A30-4ED9-BA4D-5546FC0BA939"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:moxa:iologik_e1211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "308E46FB-488A-4907-9A69-AACDE23A3394"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:moxa:iologik_e1212_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.3",
"matchCriteriaId": "BA133D93-4A1D-419A-92C5-C0C0A35187B5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:moxa:iologik_e1212:-:*:*:*:*:*:*:*",
"matchCriteriaId": "616E5D0B-0D3A-4808-8C15-2FDC35E8605C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:moxa:iologik_e1213_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.3",
"matchCriteriaId": "6E39755B-9625-4D95-B425-BD28B60180CA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:moxa:iologik_e1213:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AAE4F4E-779C-401F-A75E-AC66757DD313"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:moxa:iologik_e1214_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.3",
"matchCriteriaId": "F59B517D-63C4-4FE5-A89F-B2A235E8239A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:moxa:iologik_e1214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0837606-60F7-4563-8F80-AE7C1CC3F469"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:moxa:iologik_e1240_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.3",
"matchCriteriaId": "90601A69-F749-4E68-A034-74B9F046436F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:moxa:iologik_e1240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77A9D90D-0419-410C-AF65-0FFE0FF2882F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:moxa:iologik_e1241_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.3",
"matchCriteriaId": "38280BA6-C262-45AC-AD33-813523F64DAB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:moxa:iologik_e1241:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3239D045-8A7C-4407-B77C-E82C178D8B90"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:moxa:iologik_e1242_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.3",
"matchCriteriaId": "EB237801-4287-4A30-8CE8-DB90FAB5C118"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:moxa:iologik_e1242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D40DF4C-0EA9-44B0-8D8C-D1FC2AB5A357"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:moxa:iologik_e1260_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.3",
"matchCriteriaId": "ACDAE3E7-675E-44BF-BD57-BF5C31B969A5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:moxa:iologik_e1260:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0B4FA04-BF84-4B8A-A295-0312A3790F2E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:moxa:iologik_e1262_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.3",
"matchCriteriaId": "485CCB1F-A642-48B2-A8AD-4A7EBB5791BD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:moxa:iologik_e1262:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3366C39B-50FD-497B-A6A1-875CEB8913C5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-235250-iologik-e1200-series-web-server-vulnerability",
"source": "psirt@moxa.com",
"tags": [
"Vendor Advisory"
]
}
]
}