mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
649 lines
18 KiB
JSON
649 lines
18 KiB
JSON
{
|
|
"id": "CVE-2022-27048",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-04-15T19:15:15.747",
|
|
"lastModified": "2022-04-25T18:43:13.293",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability has been discovered in Moxa MGate which allows an attacker to perform a man-in-the-middle (MITM) attack on the device. This affects MGate MB3170 Series Firmware Version 4.2 or lower. and MGate MB3270 Series Firmware Version 4.2 or lower. and MGate MB3280 Series Firmware Version 4.1 or lower. and MGate MB3480 Series Firmware Version 3.2 or lower."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se ha detectado una vulnerabilidad en Moxa MGate que permite a un atacante llevar a cabo un ataque de tipo man-in-the-middle (MITM) en el dispositivo. Esto afecta a MGate MB3170 Series Firmware versiones 4.2 y anteriores. y MGate MB3270 Series Firmware versiones 4.2 y anteriores. y MGate MB3280 Series Firmware versiones 4.1 y anteriores. y MGate MB3480 Series Firmware versiones 3.2 y anteriores"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.4,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.2,
|
|
"impactScore": 5.2
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170i_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "2E5106D0-CF28-427B-A11F-3F69D275BDE5"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170i:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "85D6AB6D-039C-45CA-BA55-9B591BB6DC7D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170i-t_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "94F561CA-9FDF-4302-AB58-6A93CDCB66B3"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170i-t:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7C7B12F0-9B40-422C-B79C-0291795CE9E3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170-m-st_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "22FA7211-5B8C-4D0A-817A-5FBA83917A57"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170-m-st:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "125EFA67-8611-4D2A-959D-9CD2FDD8C47C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170-m-sc-t_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "833B9876-AA90-4046-99A3-13E7B35B2F07"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170-m-sc-t:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3BBA3B15-A55A-4C99-A2C9-CDB28DF50C93"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "68D5F21A-B810-4BC5-B54F-A5B35E45821D"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BBCA36D6-849E-4F19-A9B8-3BF9F65BB325"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170-t_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "B0E877E9-2113-4608-B7D7-4AEDC1024452"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170-t:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D7D1E93-1761-4C56-8937-8758E68AFE52"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170-m-sc_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "67D912F0-2A34-449D-9054-F44F9E562B05"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170-m-sc:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D997A788-E1F6-4EF9-A9B7-3B04A7171DA7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170i-s-sc_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "D937FB4A-222B-4BE7-83B9-8A1A7D483CC6"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170i-s-sc:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6EE45F05-B34E-47D4-B63D-59BADC9B3F0F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3270i_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "3FDE6C4C-019E-42E2-9400-B46168B59903"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3270i:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D473D424-7E2E-4C20-A703-1EAA844D1D46"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3270i-t_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "DC9878EF-BC6A-4663-9FB9-597FF27AE425"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3270i-t:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AED58BDD-6845-4261-8C87-55114C2E7F1E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170i-m-sc_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "7991E10D-F542-4AE5-A7BC-BC7C32913139"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170i-m-sc:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A008E212-4BB0-45B0-9559-5BFE3F39A8FB"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170-s-sc-t_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "AAF74966-4A7A-42CA-8B21-1037DAD722F1"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170-s-sc-t:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "213D9A38-A8A4-461E-80F3-091ABDF5CE49"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170i-m-sc-t_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "718EEE18-630C-480D-9667-352071765897"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170i-m-sc-t:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B1AEF455-FA00-4365-9B97-33F91A46AAB7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3270_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "179C42E1-83E2-4800-A704-D546A514F411"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3270:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C8A844A-71EB-4A4F-87BD-AA7962553B99"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3270-t_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "C07C91DA-6E30-4321-8FE3-B7E66F6DB919"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3270-t:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9FBBBF5-689C-4D25-BF39-DE3DB757E355"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170-s-sc_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "68C6F2E9-2096-4D07-8114-8FC595828091"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170-s-sc:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6795CC22-FEDE-4CA4-96CA-9F9A5D2CC620"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170-m-st-t_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "9C5F880E-5D7E-4497-9B6C-CFC3529236B7"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170-m-st-t:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "47A4D4C5-FD34-421B-AFBA-9114E275737A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3170i-s-sc-t_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2",
|
|
"matchCriteriaId": "28B18272-6DD2-45CB-89A9-3CB7775FFB8C"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3170i-s-sc-t:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "210BB9DF-219C-4006-A92B-EDB424E113C0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3280_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.1",
|
|
"matchCriteriaId": "FE7913FB-83D1-44A5-8DE0-350177265BA4"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3280:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ECB8238C-7B72-4EEB-A656-090B3E8978D4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:moxa:mgate_mb3480_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.2",
|
|
"matchCriteriaId": "1A17484F-2EE1-45FD-8341-EDB01F907AA9"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:moxa:mgate_mb3480:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3BEC8167-9069-4DA5-9281-C43AD60CD675"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mgate-mb3170-mb3270-mb3280-mb3480-protocol-gateways-vulnerability",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |