Search criteria
12 vulnerabilities found for NPort 5100A Series by Moxa
CVE-2024-3576 (GCVE-0-2024-3576)
Vulnerability from cvelistv5 – Published: 2024-05-06 12:04 – Updated: 2024-08-01 20:12- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Moxa | NPort 5100A Series |
Affected:
1.0 , ≤ 1.6
(custom)
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nport_5100a_series_firmware",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3576",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-08T17:22:39.584691Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-06T19:21:26.228Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:12:07.894Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-246328-nport-5100a-series-store-xss-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "NPort 5100A Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Nicolai Gr\u00f8dum of PwC Norway"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe NPort 5100A Series firmware version v1.6 and prior versions are\u003c/span\u003e affected by web server XSS vulnerability. The vulnerability is caused by not correctly neutralizing user-controllable input before placing it in output. Malicious users may use the vulnerability to get sensitive information and escalate privileges. "
}
],
"value": "The NPort 5100A Series firmware version v1.6 and prior versions are affected by web server XSS vulnerability. The vulnerability is caused by not correctly neutralizing user-controllable input before placing it in output. Malicious users may use the vulnerability to get sensitive information and escalate privileges. "
}
],
"impacts": [
{
"capecId": "CAPEC-63",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-63 Cross-Site Scripting (XSS)"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-07T08:27:05.616Z",
"orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"shortName": "Moxa"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-246328-nport-5100a-series-store-xss-vulnerability"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMoxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below:\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003eNPort 5100A Series: Please contact Moxa Technical Support for the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.moxa.com/tw/support/technical-support\"\u003esecurity patch (v1.6.3).\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003c/p\u003e"
}
],
"value": "Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below:\n\n * NPort 5100A Series: Please contact Moxa Technical Support for the security patch (v1.6.3). https://www.moxa.com/tw/support/technical-support \n\n"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "NPort 5100A Series Store XSS Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"assignerShortName": "Moxa",
"cveId": "CVE-2024-3576",
"datePublished": "2024-05-06T12:04:47.826Z",
"dateReserved": "2024-04-10T10:56:14.293Z",
"dateUpdated": "2024-08-01T20:12:07.894Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-4929 (GCVE-0-2023-4929)
Vulnerability from cvelistv5 – Published: 2023-10-03 13:54 – Updated: 2024-09-23 13:29- CWE-354 - Improper Validation of Integrity Check Value
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Moxa | NPort 5000AI-M12 Series |
Affected:
1.0 , ≤ 1.5
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:44:52.628Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:moxa:nport_5100ai_m12:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5100ai_m12",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "1.5",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_5100:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5100",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "3.10",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:moxa:nport_5100a:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5100a",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:moxa:nport_5200_series_firmware:2.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5200_series_firmware",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.12",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:moxa:nport_5200a_series_firmware:1.2:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5200a_series_firmware",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.12",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5600_series_firmware",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "3.11",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_5600_dt:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5600_dt",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.9",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_ia_5000:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_ia_5000",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.1",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_ia_5000a:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_ia_5000a",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.0",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_ia_5000a_io:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_ia_5000a_io",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.0",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_iaw_5000a_io:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_iaw_5000a_io",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.2",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_p5150a:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_p5150a",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4929",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-23T13:08:12.493856Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-23T13:29:04.471Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "NPort 5000AI-M12 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.5",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5100 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.10",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5100A Series ",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5200 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "2.12",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5200A Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5400 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.14",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5600 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.11",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5600-DT Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "2.9",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort IA5000 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "2.1",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort IA5000A Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "2.0",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort IA5000A-I/O Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "2.0",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort IAW5000A-I/O Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "2.2",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort P5150A Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAll firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices.\u003c/p\u003e"
}
],
"value": "All firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices.\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-145",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-145 Checksum Spoofing"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-354",
"description": "CWE-354 Improper Validation of Integrity Check Value",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-03T13:54:49.293Z",
"orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"shortName": "Moxa"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eDue to design restrictions, we could not fix this vulnerability in NPort 5000 Series. We suggest users follow the instructions in the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.moxa.com/getmedia/67b5e549-a125-4a6a-b99b-23017c75cfc1/moxa-the-security-hardening-guide-for-the-nport-5000-series-tech-note-v1.1.pdf\"\u003e\u003cu\u003ehardening guide\u003c/u\u003e\u003c/a\u003e in order to mitigate this vulnerability. Additionally, refer to the following mitigation measures to deploy the product in an appropriate product security context. \u003c/p\u003e\u003cp\u003eMoxa recommends users follow these CISA recommendations. Users should \u003c/p\u003e\u003col\u003e\u003cli\u003eReduce network exposure by ensuring that all control system devices and systems are not accessible from the Internet.\u003c/li\u003e\u003cli\u003ePlace control system networks and remote devices behind firewalls, isolating them from business networks.\u003c/li\u003e\u003cli\u003eWhen remote access is necessary, employ secure methods such as Virtual Private Networks (VPNs). It is important to note that VPNs may have vulnerabilities and should be kept up to date with the latest available version. Remember that the security of a VPN depends on the security of its connected devices.\u003c/li\u003e\u003c/ol\u003e"
}
],
"value": "Due to design restrictions, we could not fix this vulnerability in NPort 5000 Series. We suggest users follow the instructions in the hardening guide https://www.moxa.com/getmedia/67b5e549-a125-4a6a-b99b-23017c75cfc1/moxa-the-security-hardening-guide-for-the-nport-5000-series-tech-note-v1.1.pdf in order to mitigate this vulnerability. Additionally, refer to the following mitigation measures to deploy the product in an appropriate product security context. \n\nMoxa recommends users follow these CISA recommendations. Users should \n\n * Reduce network exposure by ensuring that all control system devices and systems are not accessible from the Internet.\n * Place control system networks and remote devices behind firewalls, isolating them from business networks.\n * When remote access is necessary, employ secure methods such as Virtual Private Networks (VPNs). It is important to note that VPNs may have vulnerabilities and should be kept up to date with the latest available version. Remember that the security of a VPN depends on the security of its connected devices.\n"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "NPort 5000 Series Firmware Improper Validation of Integrity Check Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"assignerShortName": "Moxa",
"cveId": "CVE-2023-4929",
"datePublished": "2023-10-03T13:54:49.293Z",
"dateReserved": "2023-09-13T01:12:13.466Z",
"dateUpdated": "2024-09-23T13:29:04.471Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3576 (GCVE-0-2024-3576)
Vulnerability from nvd – Published: 2024-05-06 12:04 – Updated: 2024-08-01 20:12- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Moxa | NPort 5100A Series |
Affected:
1.0 , ≤ 1.6
(custom)
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nport_5100a_series_firmware",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3576",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-08T17:22:39.584691Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-06T19:21:26.228Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:12:07.894Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-246328-nport-5100a-series-store-xss-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "NPort 5100A Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Nicolai Gr\u00f8dum of PwC Norway"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe NPort 5100A Series firmware version v1.6 and prior versions are\u003c/span\u003e affected by web server XSS vulnerability. The vulnerability is caused by not correctly neutralizing user-controllable input before placing it in output. Malicious users may use the vulnerability to get sensitive information and escalate privileges. "
}
],
"value": "The NPort 5100A Series firmware version v1.6 and prior versions are affected by web server XSS vulnerability. The vulnerability is caused by not correctly neutralizing user-controllable input before placing it in output. Malicious users may use the vulnerability to get sensitive information and escalate privileges. "
}
],
"impacts": [
{
"capecId": "CAPEC-63",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-63 Cross-Site Scripting (XSS)"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-07T08:27:05.616Z",
"orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"shortName": "Moxa"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-246328-nport-5100a-series-store-xss-vulnerability"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMoxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below:\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003eNPort 5100A Series: Please contact Moxa Technical Support for the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.moxa.com/tw/support/technical-support\"\u003esecurity patch (v1.6.3).\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003c/p\u003e"
}
],
"value": "Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below:\n\n * NPort 5100A Series: Please contact Moxa Technical Support for the security patch (v1.6.3). https://www.moxa.com/tw/support/technical-support \n\n"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "NPort 5100A Series Store XSS Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"assignerShortName": "Moxa",
"cveId": "CVE-2024-3576",
"datePublished": "2024-05-06T12:04:47.826Z",
"dateReserved": "2024-04-10T10:56:14.293Z",
"dateUpdated": "2024-08-01T20:12:07.894Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-4929 (GCVE-0-2023-4929)
Vulnerability from nvd – Published: 2023-10-03 13:54 – Updated: 2024-09-23 13:29- CWE-354 - Improper Validation of Integrity Check Value
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Moxa | NPort 5000AI-M12 Series |
Affected:
1.0 , ≤ 1.5
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:44:52.628Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:moxa:nport_5100ai_m12:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5100ai_m12",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "1.5",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_5100:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5100",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "3.10",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:moxa:nport_5100a:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5100a",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:moxa:nport_5200_series_firmware:2.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5200_series_firmware",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.12",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:moxa:nport_5200a_series_firmware:1.2:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5200a_series_firmware",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.12",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5600_series_firmware",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "3.11",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_5600_dt:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_5600_dt",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.9",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_ia_5000:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_ia_5000",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.1",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_ia_5000a:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_ia_5000a",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.0",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_ia_5000a_io:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_ia_5000a_io",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.0",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_iaw_5000a_io:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_iaw_5000a_io",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "2.2",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:moxa:nport_p5150a:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "nport_p5150a",
"vendor": "moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4929",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-23T13:08:12.493856Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-23T13:29:04.471Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "NPort 5000AI-M12 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.5",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5100 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.10",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5100A Series ",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5200 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "2.12",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5200A Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5400 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.14",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5600 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.11",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort 5600-DT Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "2.9",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort IA5000 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "2.1",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort IA5000A Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "2.0",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort IA5000A-I/O Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "2.0",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort IAW5000A-I/O Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "2.2",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "NPort P5150A Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAll firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices.\u003c/p\u003e"
}
],
"value": "All firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices.\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-145",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-145 Checksum Spoofing"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-354",
"description": "CWE-354 Improper Validation of Integrity Check Value",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-03T13:54:49.293Z",
"orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"shortName": "Moxa"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eDue to design restrictions, we could not fix this vulnerability in NPort 5000 Series. We suggest users follow the instructions in the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.moxa.com/getmedia/67b5e549-a125-4a6a-b99b-23017c75cfc1/moxa-the-security-hardening-guide-for-the-nport-5000-series-tech-note-v1.1.pdf\"\u003e\u003cu\u003ehardening guide\u003c/u\u003e\u003c/a\u003e in order to mitigate this vulnerability. Additionally, refer to the following mitigation measures to deploy the product in an appropriate product security context. \u003c/p\u003e\u003cp\u003eMoxa recommends users follow these CISA recommendations. Users should \u003c/p\u003e\u003col\u003e\u003cli\u003eReduce network exposure by ensuring that all control system devices and systems are not accessible from the Internet.\u003c/li\u003e\u003cli\u003ePlace control system networks and remote devices behind firewalls, isolating them from business networks.\u003c/li\u003e\u003cli\u003eWhen remote access is necessary, employ secure methods such as Virtual Private Networks (VPNs). It is important to note that VPNs may have vulnerabilities and should be kept up to date with the latest available version. Remember that the security of a VPN depends on the security of its connected devices.\u003c/li\u003e\u003c/ol\u003e"
}
],
"value": "Due to design restrictions, we could not fix this vulnerability in NPort 5000 Series. We suggest users follow the instructions in the hardening guide https://www.moxa.com/getmedia/67b5e549-a125-4a6a-b99b-23017c75cfc1/moxa-the-security-hardening-guide-for-the-nport-5000-series-tech-note-v1.1.pdf in order to mitigate this vulnerability. Additionally, refer to the following mitigation measures to deploy the product in an appropriate product security context. \n\nMoxa recommends users follow these CISA recommendations. Users should \n\n * Reduce network exposure by ensuring that all control system devices and systems are not accessible from the Internet.\n * Place control system networks and remote devices behind firewalls, isolating them from business networks.\n * When remote access is necessary, employ secure methods such as Virtual Private Networks (VPNs). It is important to note that VPNs may have vulnerabilities and should be kept up to date with the latest available version. Remember that the security of a VPN depends on the security of its connected devices.\n"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "NPort 5000 Series Firmware Improper Validation of Integrity Check Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"assignerShortName": "Moxa",
"cveId": "CVE-2023-4929",
"datePublished": "2023-10-03T13:54:49.293Z",
"dateReserved": "2023-09-13T01:12:13.466Z",
"dateUpdated": "2024-09-23T13:29:04.471Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
VAR-201702-0860
Vulnerability from variot - Updated: 2024-02-13 22:34An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating. MOXANport is a serial communication server. MoxaNPort has a credential management vulnerability. An unauthenticated attacker exploits the vulnerability to obtain an administrator password. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-0860",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nport 5600 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5100a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport 6100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5400 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport 5200a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport p5150a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5200 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5100a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5400 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5410",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600-8-dtl series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5630",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650i-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5x50a1-m12 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5150a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5110\u003c2.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5130/5150\u003c3.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5200\u003c2.8"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5400\u003c3.11"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5600\u003c3.7"
},
{
"model": "nport p5150a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5100a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5200a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5150ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5250ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5450ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600-8-dt",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport 5600-8-dtl",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "6x50\u003c1.13.11"
},
{
"model": "nport ia5450a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport 6100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5400 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport p5150a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport p5150a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport ia5450a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "6x500"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "64501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "62501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61100"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "60000"
},
{
"model": "nport 5x50ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-dt/dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-8-dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "56000"
},
{
"model": "nport 5450ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "54000"
},
{
"model": "nport 5250ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5200a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "52000"
},
{
"model": "nport 5150ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.5"
},
{
"model": "nport 5100a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51000"
},
{
"model": "nport ia5450a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "6x501.14"
},
{
"model": "nport 5600-8-dtl",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5600-8-dt",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "56003.7"
},
{
"model": "nport 5450ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "54003.11"
},
{
"model": "nport 5250ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "52002.8"
},
{
"model": "nport 5150ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.6"
},
{
"model": "nport 5100a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11885"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007639"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-030"
},
{
"db": "NVD",
"id": "CVE-2016-9361"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.13",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9361"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Reid Wightman of Digital Bonds Labs",
"sources": [
{
"db": "BID",
"id": "85965"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-030"
}
],
"trust": 0.9
},
"cve": "CVE-2016-9361",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2016-9361",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-11885",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-98181",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2016-9361",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-9361",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2016-11885",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201612-030",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-98181",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2016-9361",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11885"
},
{
"db": "VULHUB",
"id": "VHN-98181"
},
{
"db": "VULMON",
"id": "CVE-2016-9361"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007639"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-030"
},
{
"db": "NVD",
"id": "CVE-2016-9361"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating. MOXANport is a serial communication server. MoxaNPort has a credential management vulnerability. An unauthenticated attacker exploits the vulnerability to obtain an administrator password. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9361"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007639"
},
{
"db": "CNVD",
"id": "CNVD-2016-11885"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "VULHUB",
"id": "VHN-98181"
},
{
"db": "VULMON",
"id": "CVE-2016-9361"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "ICS CERT",
"id": "ICSA-16-336-02",
"trust": 3.5
},
{
"db": "NVD",
"id": "CVE-2016-9361",
"trust": 3.5
},
{
"db": "BID",
"id": "85965",
"trust": 2.1
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007639",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201612-030",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-11885",
"trust": 0.6
},
{
"db": "ICS CERT ALERT",
"id": "ICS-ALERT-16-099-01",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-98181",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2016-9361",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11885"
},
{
"db": "VULHUB",
"id": "VHN-98181"
},
{
"db": "VULMON",
"id": "CVE-2016-9361"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007639"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-030"
},
{
"db": "NVD",
"id": "CVE-2016-9361"
}
]
},
"id": "VAR-201702-0860",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11885"
},
{
"db": "VULHUB",
"id": "VHN-98181"
}
],
"trust": 1.596736468
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11885"
}
]
},
"last_update_date": "2024-02-13T22:34:40.118000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
"trust": 0.8,
"url": "http://japan.moxa.com/index.htm"
},
{
"title": "MoxaNPort Credential Management Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/84974"
},
{
"title": "Multiple Moxa Nport Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66082"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11885"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007639"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-030"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98181"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007639"
},
{
"db": "NVD",
"id": "CVE-2016-9361"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.5,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/bid/85965"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9361"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9361"
},
{
"trust": 0.3,
"url": "http://www.moxa.com/product/vport_sdk.htm"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/287.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.rapid7.com/db/modules/auxiliary/scanner/scada/moxa_discover"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11885"
},
{
"db": "VULHUB",
"id": "VHN-98181"
},
{
"db": "VULMON",
"id": "CVE-2016-9361"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007639"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-030"
},
{
"db": "NVD",
"id": "CVE-2016-9361"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-11885"
},
{
"db": "VULHUB",
"id": "VHN-98181"
},
{
"db": "VULMON",
"id": "CVE-2016-9361"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007639"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-030"
},
{
"db": "NVD",
"id": "CVE-2016-9361"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11885"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-98181"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULMON",
"id": "CVE-2016-9361"
},
{
"date": "2016-04-08T00:00:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007639"
},
{
"date": "2016-04-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-030"
},
{
"date": "2017-02-13T21:59:02.080000",
"db": "NVD",
"id": "CVE-2016-9361"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11885"
},
{
"date": "2017-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-98181"
},
{
"date": "2017-02-17T00:00:00",
"db": "VULMON",
"id": "CVE-2016-9361"
},
{
"date": "2016-12-20T02:04:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007639"
},
{
"date": "2016-12-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-030"
},
{
"date": "2017-02-17T18:08:21.947000",
"db": "NVD",
"id": "CVE-2016-9361"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-030"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Moxa NPort Vulnerability in product management passwords being retried without authentication",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-007639"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-030"
}
],
"trust": 0.6
}
}
VAR-201702-0593
Vulnerability from variot - Updated: 2023-12-18 12:04An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Requests are not verified to be intentionally submitted by the proper user (CROSS-SITE REQUEST FORGERY). MOXANport is a serial communication server. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-0593",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nport 5600 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5100a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport 6100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5400 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport 5200a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport p5150a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5200 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5100a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5400 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5410",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600-8-dtl series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5630",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650i-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5x50a1-m12 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5150a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5110\u003c2.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5130/5150\u003c3.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5200\u003c2.8"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5400\u003c3.11"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5600\u003c3.7"
},
{
"model": "nport p5150a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5100a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5200a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5150ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5250ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5450ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600-8-dt",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport 5600-8-dtl",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "6x50\u003c1.13.11"
},
{
"model": "nport ia5450a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5400 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport p5150a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5200 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport p5150a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport ia5450a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "6x500"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "64501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "62501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61100"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "60000"
},
{
"model": "nport 5x50ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-dt/dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-8-dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "56000"
},
{
"model": "nport 5450ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "54000"
},
{
"model": "nport 5250ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5200a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "52000"
},
{
"model": "nport 5150ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.5"
},
{
"model": "nport 5100a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51000"
},
{
"model": "nport ia5450a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "6x501.14"
},
{
"model": "nport 5600-8-dtl",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5600-8-dt",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "56003.7"
},
{
"model": "nport 5450ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "54003.11"
},
{
"model": "nport 5250ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "52002.8"
},
{
"model": "nport 5150ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.6"
},
{
"model": "nport 5100a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11881"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007641"
},
{
"db": "NVD",
"id": "CVE-2016-9365"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-034"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.13",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9365"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Reid Wightman of Digital Bonds Labs",
"sources": [
{
"db": "BID",
"id": "85965"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-034"
}
],
"trust": 0.9
},
"cve": "CVE-2016-9365",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2016-9365",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-11881",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-98185",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2016-9365",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-9365",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2016-11881",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201612-034",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-98185",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11881"
},
{
"db": "VULHUB",
"id": "VHN-98185"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007641"
},
{
"db": "NVD",
"id": "CVE-2016-9365"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-034"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Requests are not verified to be intentionally submitted by the proper user (CROSS-SITE REQUEST FORGERY). MOXANport is a serial communication server. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9365"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007641"
},
{
"db": "CNVD",
"id": "CNVD-2016-11881"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "VULHUB",
"id": "VHN-98185"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-9365",
"trust": 3.4
},
{
"db": "ICS CERT",
"id": "ICSA-16-336-02",
"trust": 3.4
},
{
"db": "BID",
"id": "85965",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007641",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201612-034",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-11881",
"trust": 0.6
},
{
"db": "ICS CERT ALERT",
"id": "ICS-ALERT-16-099-01",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-98185",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11881"
},
{
"db": "VULHUB",
"id": "VHN-98185"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007641"
},
{
"db": "NVD",
"id": "CVE-2016-9365"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-034"
}
]
},
"id": "VAR-201702-0593",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11881"
},
{
"db": "VULHUB",
"id": "VHN-98185"
}
],
"trust": 1.596736468
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11881"
}
]
},
"last_update_date": "2023-12-18T12:04:37.410000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
"trust": 0.8,
"url": "http://japan.moxa.com/index.htm"
},
{
"title": "Patch for MoxaNPort Cross-Site Request Forgery Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/84969"
},
{
"title": "Multiple Moxa Nport Repair measures for product cross-site request forgery vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66087"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11881"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007641"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-034"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-352",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98185"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007641"
},
{
"db": "NVD",
"id": "CVE-2016-9365"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/85965"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9365"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9365"
},
{
"trust": 0.3,
"url": "http://www.moxa.com/product/vport_sdk.htm"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11881"
},
{
"db": "VULHUB",
"id": "VHN-98185"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007641"
},
{
"db": "NVD",
"id": "CVE-2016-9365"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-034"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-11881"
},
{
"db": "VULHUB",
"id": "VHN-98185"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007641"
},
{
"db": "NVD",
"id": "CVE-2016-9365"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-034"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11881"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-98185"
},
{
"date": "2016-04-08T00:00:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007641"
},
{
"date": "2017-02-13T21:59:02.207000",
"db": "NVD",
"id": "CVE-2016-9365"
},
{
"date": "2016-04-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-034"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11881"
},
{
"date": "2017-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-98185"
},
{
"date": "2016-12-20T02:04:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007641"
},
{
"date": "2017-02-17T18:09:20.980000",
"db": "NVD",
"id": "CVE-2016-9365"
},
{
"date": "2016-12-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-034"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-034"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Moxa NPort Product cross-site request forgery vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-007641"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "cross-site request forgery",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-034"
}
],
"trust": 0.6
}
}
VAR-201702-0596
Vulnerability from variot - Updated: 2023-12-18 12:04An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution. MOXANport is a serial communication server. MoxaNPort has an access control vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-0596",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nport 5600 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5100a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport 6100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5400 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport 5200a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport p5150a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5200 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5100a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5400 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5410",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600-8-dtl series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5630",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650i-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5x50a1-m12 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5150a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5110\u003c2.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5130/5150\u003c3.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5200\u003c2.8"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5400\u003c3.11"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5600\u003c3.7"
},
{
"model": "nport p5150a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5100a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5200a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5150ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5250ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5450ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600-8-dt",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport 5600-8-dtl",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "6x50\u003c1.13.11"
},
{
"model": "nport ia5450a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport 6100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5600-8-dtl series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5400 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport p5150a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5200 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport p5150a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport ia5450a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "6x500"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "64501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "62501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61100"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "60000"
},
{
"model": "nport 5x50ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-dt/dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-8-dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "56000"
},
{
"model": "nport 5450ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "54000"
},
{
"model": "nport 5250ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5200a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "52000"
},
{
"model": "nport 5150ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.5"
},
{
"model": "nport 5100a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51000"
},
{
"model": "nport ia5450a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "6x501.14"
},
{
"model": "nport 5600-8-dtl",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5600-8-dt",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "56003.7"
},
{
"model": "nport 5450ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "54003.11"
},
{
"model": "nport 5250ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "52002.8"
},
{
"model": "nport 5150ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.6"
},
{
"model": "nport 5100a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11884"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007644"
},
{
"db": "NVD",
"id": "CVE-2016-9369"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-031"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.13",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9369"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Reid Wightman of Digital Bonds Labs",
"sources": [
{
"db": "BID",
"id": "85965"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-031"
}
],
"trust": 0.9
},
"cve": "CVE-2016-9369",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": true,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2016-9369",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-11884",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-98189",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2016-9369",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-9369",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2016-11884",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201612-031",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-98189",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11884"
},
{
"db": "VULHUB",
"id": "VHN-98189"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007644"
},
{
"db": "NVD",
"id": "CVE-2016-9369"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-031"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution. MOXANport is a serial communication server. MoxaNPort has an access control vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9369"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007644"
},
{
"db": "CNVD",
"id": "CNVD-2016-11884"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "VULHUB",
"id": "VHN-98189"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-9369",
"trust": 3.4
},
{
"db": "ICS CERT",
"id": "ICSA-16-336-02",
"trust": 3.4
},
{
"db": "BID",
"id": "85965",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007644",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201612-031",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-11884",
"trust": 0.6
},
{
"db": "ICS CERT ALERT",
"id": "ICS-ALERT-16-099-01",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-98189",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11884"
},
{
"db": "VULHUB",
"id": "VHN-98189"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007644"
},
{
"db": "NVD",
"id": "CVE-2016-9369"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-031"
}
]
},
"id": "VAR-201702-0596",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11884"
},
{
"db": "VULHUB",
"id": "VHN-98189"
}
],
"trust": 1.596736468
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11884"
}
]
},
"last_update_date": "2023-12-18T12:04:37.447000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
"trust": 0.8,
"url": "http://japan.moxa.com/index.htm"
},
{
"title": "MoxaNPort Access Control Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/84973"
},
{
"title": "Multiple Moxa Nport Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66084"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11884"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007644"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-031"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98189"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007644"
},
{
"db": "NVD",
"id": "CVE-2016-9369"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/85965"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9369"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9369"
},
{
"trust": 0.3,
"url": "http://www.moxa.com/product/vport_sdk.htm"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11884"
},
{
"db": "VULHUB",
"id": "VHN-98189"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007644"
},
{
"db": "NVD",
"id": "CVE-2016-9369"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-031"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-11884"
},
{
"db": "VULHUB",
"id": "VHN-98189"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007644"
},
{
"db": "NVD",
"id": "CVE-2016-9369"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-031"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11884"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-98189"
},
{
"date": "2016-04-08T00:00:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007644"
},
{
"date": "2017-02-13T21:59:02.300000",
"db": "NVD",
"id": "CVE-2016-9369"
},
{
"date": "2016-04-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-031"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11884"
},
{
"date": "2017-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-98189"
},
{
"date": "2016-12-20T02:04:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007644"
},
{
"date": "2017-02-17T18:12:12.407000",
"db": "NVD",
"id": "CVE-2016-9369"
},
{
"date": "2016-12-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-031"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-031"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Moxa NPort Remote code execution vulnerability in product firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-007644"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-031"
}
],
"trust": 0.6
}
}
VAR-201702-0851
Vulnerability from variot - Updated: 2023-12-18 12:04An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. A configuration file contains parameters that represent passwords in plaintext. MOXANport is a serial communication server. MoxaNPort has a plaintext storage vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. An attacker could exploit this vulnerability to obtain sensitive information
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-0851",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nport 5600 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5100a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport 6100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5400 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport 5200a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport p5150a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5200 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5100a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5400 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5410",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600-8-dtl series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5630",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650i-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5x50a1-m12 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5150a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5110\u003c2.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5130/5150\u003c3.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5200\u003c2.8"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5400\u003c3.11"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5600\u003c3.7"
},
{
"model": "nport p5150a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5100a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5200a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5150ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5250ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5450ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600-8-dt",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport 5600-8-dtl",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "6x50\u003c1.13.11"
},
{
"model": "nport ia5450a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5400 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport p5150a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5200 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport p5150a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport ia5450a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "6x500"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "64501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "62501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61100"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "60000"
},
{
"model": "nport 5x50ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-dt/dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-8-dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "56000"
},
{
"model": "nport 5450ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "54000"
},
{
"model": "nport 5250ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5200a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "52000"
},
{
"model": "nport 5150ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.5"
},
{
"model": "nport 5100a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51000"
},
{
"model": "nport ia5450a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "6x501.14"
},
{
"model": "nport 5600-8-dtl",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5600-8-dt",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "56003.7"
},
{
"model": "nport 5450ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "54003.11"
},
{
"model": "nport 5250ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "52002.8"
},
{
"model": "nport 5150ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.6"
},
{
"model": "nport 5100a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11879"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007638"
},
{
"db": "NVD",
"id": "CVE-2016-9348"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-036"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.13",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9348"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Reid Wightman of Digital Bonds Labs",
"sources": [
{
"db": "BID",
"id": "85965"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-036"
}
],
"trust": 0.9
},
"cve": "CVE-2016-9348",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 2.1,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2016-9348",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Low",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 1.7,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.1,
"id": "CNVD-2016-11879",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-98168",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 3.3,
"baseSeverity": "Low",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2016-9348",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-9348",
"trust": 1.8,
"value": "LOW"
},
{
"author": "CNVD",
"id": "CNVD-2016-11879",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-201612-036",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-98168",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11879"
},
{
"db": "VULHUB",
"id": "VHN-98168"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007638"
},
{
"db": "NVD",
"id": "CVE-2016-9348"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-036"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. A configuration file contains parameters that represent passwords in plaintext. MOXANport is a serial communication server. MoxaNPort has a plaintext storage vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. An attacker could exploit this vulnerability to obtain sensitive information",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9348"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007638"
},
{
"db": "CNVD",
"id": "CNVD-2016-11879"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "VULHUB",
"id": "VHN-98168"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-9348",
"trust": 3.4
},
{
"db": "ICS CERT",
"id": "ICSA-16-336-02",
"trust": 3.4
},
{
"db": "BID",
"id": "85965",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007638",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201612-036",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-11879",
"trust": 0.6
},
{
"db": "ICS CERT ALERT",
"id": "ICS-ALERT-16-099-01",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-98168",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11879"
},
{
"db": "VULHUB",
"id": "VHN-98168"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007638"
},
{
"db": "NVD",
"id": "CVE-2016-9348"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-036"
}
]
},
"id": "VAR-201702-0851",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11879"
},
{
"db": "VULHUB",
"id": "VHN-98168"
}
],
"trust": 1.596736468
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11879"
}
]
},
"last_update_date": "2023-12-18T12:04:37.373000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
"trust": 0.8,
"url": "http://japan.moxa.com/index.htm"
},
{
"title": "MoxaNPort plaintext storage vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/84966"
},
{
"title": "Multiple Moxa Nport Product configuration error vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66090"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11879"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007638"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-036"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-255",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98168"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007638"
},
{
"db": "NVD",
"id": "CVE-2016-9348"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/85965"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9348"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9348"
},
{
"trust": 0.3,
"url": "http://www.moxa.com/product/vport_sdk.htm"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11879"
},
{
"db": "VULHUB",
"id": "VHN-98168"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007638"
},
{
"db": "NVD",
"id": "CVE-2016-9348"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-036"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-11879"
},
{
"db": "VULHUB",
"id": "VHN-98168"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007638"
},
{
"db": "NVD",
"id": "CVE-2016-9348"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-036"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11879"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-98168"
},
{
"date": "2016-04-08T00:00:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007638"
},
{
"date": "2017-02-13T21:59:01.847000",
"db": "NVD",
"id": "CVE-2016-9348"
},
{
"date": "2016-04-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-036"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11879"
},
{
"date": "2017-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-98168"
},
{
"date": "2016-12-20T02:04:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007638"
},
{
"date": "2017-02-17T18:07:51.537000",
"db": "NVD",
"id": "CVE-2016-9348"
},
{
"date": "2016-12-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-036"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-036"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Moxa NPort Vulnerability in product passwords displayed in clear text",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-007638"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-036"
}
],
"trust": 0.6
}
}
VAR-201702-0862
Vulnerability from variot - Updated: 2023-12-18 12:04An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Buffer overflow vulnerability may allow an unauthenticated attacker to remotely execute arbitrary code. MOXANport is a serial communication server. MoxaNPort has a buffer overflow vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-0862",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nport 5600 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5100a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport 6100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5400 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport 5200a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport p5150a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5200 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5100a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5400 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5410",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600-8-dtl series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5630",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650i-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5x50a1-m12 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5150a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5110\u003c2.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5130/5150\u003c3.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5200\u003c2.8"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5400\u003c3.11"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5600\u003c3.7"
},
{
"model": "nport p5150a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5100a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5200a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5150ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5250ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5450ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600-8-dt",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport 5600-8-dtl",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "6x50\u003c1.13.11"
},
{
"model": "nport ia5450a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport 6100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5400 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport p5150a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5200 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport p5150a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport ia5450a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "6x500"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "64501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "62501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61100"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "60000"
},
{
"model": "nport 5x50ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-dt/dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-8-dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "56000"
},
{
"model": "nport 5450ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "54000"
},
{
"model": "nport 5250ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5200a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "52000"
},
{
"model": "nport 5150ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.5"
},
{
"model": "nport 5100a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51000"
},
{
"model": "nport ia5450a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "6x501.14"
},
{
"model": "nport 5600-8-dtl",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5600-8-dt",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "56003.7"
},
{
"model": "nport 5450ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "54003.11"
},
{
"model": "nport 5250ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "52002.8"
},
{
"model": "nport 5150ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.6"
},
{
"model": "nport 5100a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11883"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007640"
},
{
"db": "NVD",
"id": "CVE-2016-9363"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-032"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.13",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9363"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Reid Wightman of Digital Bonds Labs",
"sources": [
{
"db": "BID",
"id": "85965"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-032"
}
],
"trust": 0.9
},
"cve": "CVE-2016-9363",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2016-9363",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-11883",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-98183",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "Low",
"baseScore": 7.3,
"baseSeverity": "High",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2016-9363",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-9363",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2016-11883",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201612-032",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-98183",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11883"
},
{
"db": "VULHUB",
"id": "VHN-98183"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007640"
},
{
"db": "NVD",
"id": "CVE-2016-9363"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-032"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Buffer overflow vulnerability may allow an unauthenticated attacker to remotely execute arbitrary code. MOXANport is a serial communication server. MoxaNPort has a buffer overflow vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9363"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007640"
},
{
"db": "CNVD",
"id": "CNVD-2016-11883"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "VULHUB",
"id": "VHN-98183"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-9363",
"trust": 3.4
},
{
"db": "ICS CERT",
"id": "ICSA-16-336-02",
"trust": 3.4
},
{
"db": "BID",
"id": "85965",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007640",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201612-032",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-11883",
"trust": 0.6
},
{
"db": "ICS CERT ALERT",
"id": "ICS-ALERT-16-099-01",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-98183",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11883"
},
{
"db": "VULHUB",
"id": "VHN-98183"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007640"
},
{
"db": "NVD",
"id": "CVE-2016-9363"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-032"
}
]
},
"id": "VAR-201702-0862",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11883"
},
{
"db": "VULHUB",
"id": "VHN-98183"
}
],
"trust": 1.596736468
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11883"
}
]
},
"last_update_date": "2023-12-18T12:04:37.217000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
"trust": 0.8,
"url": "http://japan.moxa.com/index.htm"
},
{
"title": "MoxaNPort Buffer Overflow Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/84971"
},
{
"title": "Multiple Moxa Nport Product Buffer Overflow Vulnerability Fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66085"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11883"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007640"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-032"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98183"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007640"
},
{
"db": "NVD",
"id": "CVE-2016-9363"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/85965"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9363"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9363"
},
{
"trust": 0.3,
"url": "http://www.moxa.com/product/vport_sdk.htm"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11883"
},
{
"db": "VULHUB",
"id": "VHN-98183"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007640"
},
{
"db": "NVD",
"id": "CVE-2016-9363"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-032"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-11883"
},
{
"db": "VULHUB",
"id": "VHN-98183"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007640"
},
{
"db": "NVD",
"id": "CVE-2016-9363"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-032"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11883"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-98183"
},
{
"date": "2016-04-08T00:00:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007640"
},
{
"date": "2017-02-13T21:59:02.143000",
"db": "NVD",
"id": "CVE-2016-9363"
},
{
"date": "2016-04-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-032"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11883"
},
{
"date": "2017-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-98183"
},
{
"date": "2016-12-20T02:04:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007640"
},
{
"date": "2017-02-17T18:09:59.980000",
"db": "NVD",
"id": "CVE-2016-9363"
},
{
"date": "2016-12-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-032"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-032"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Moxa NPort Product buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-007640"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-032"
}
],
"trust": 0.6
}
}
VAR-201702-0595
Vulnerability from variot - Updated: 2023-12-18 12:04An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. The amount of resources requested by a malicious actor is not restricted, leading to a denial-of-service caused by resource exhaustion. plural Moxa NPort The product does not limit the amount of resources requested, resulting in denial of service (DoS) There is a vulnerability that can be exploited.Denial of service due to resource exhaustion by an attacker (DoS) May be in a state. MOXANport is a serial communication server. MoxaNPort has a denial of service vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-0595",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nport 5600 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5100a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport 6100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5400 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport 5200a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport p5150a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5200 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5100a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5400 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5410",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600-8-dtl series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5630",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650i-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5x50a1-m12 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5150a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5110\u003c2.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5130/5150\u003c3.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5200\u003c2.8"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5400\u003c3.11"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5600\u003c3.7"
},
{
"model": "nport p5150a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5100a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5200a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5150ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5250ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5450ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600-8-dt",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport 5600-8-dtl",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "6x50\u003c1.13.11"
},
{
"model": "nport ia5450a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport 6100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5400 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport p5150a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5200 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport p5150a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport ia5450a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "6x500"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "64501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "62501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61100"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "60000"
},
{
"model": "nport 5x50ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-dt/dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-8-dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "56000"
},
{
"model": "nport 5450ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "54000"
},
{
"model": "nport 5250ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5200a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "52000"
},
{
"model": "nport 5150ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.5"
},
{
"model": "nport 5100a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51000"
},
{
"model": "nport ia5450a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "6x501.14"
},
{
"model": "nport 5600-8-dtl",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5600-8-dt",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "56003.7"
},
{
"model": "nport 5450ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "54003.11"
},
{
"model": "nport 5250ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "52002.8"
},
{
"model": "nport 5150ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.6"
},
{
"model": "nport 5100a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11878"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007643"
},
{
"db": "NVD",
"id": "CVE-2016-9367"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-037"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.13",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9367"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Reid Wightman of Digital Bonds Labs",
"sources": [
{
"db": "BID",
"id": "85965"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-037"
}
],
"trust": 0.9
},
"cve": "CVE-2016-9367",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": true,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-9367",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-11878",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-98187",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-9367",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-9367",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2016-11878",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201612-037",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-98187",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11878"
},
{
"db": "VULHUB",
"id": "VHN-98187"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007643"
},
{
"db": "NVD",
"id": "CVE-2016-9367"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-037"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. The amount of resources requested by a malicious actor is not restricted, leading to a denial-of-service caused by resource exhaustion. plural Moxa NPort The product does not limit the amount of resources requested, resulting in denial of service (DoS) There is a vulnerability that can be exploited.Denial of service due to resource exhaustion by an attacker (DoS) May be in a state. MOXANport is a serial communication server. MoxaNPort has a denial of service vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9367"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007643"
},
{
"db": "CNVD",
"id": "CNVD-2016-11878"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "VULHUB",
"id": "VHN-98187"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-9367",
"trust": 3.4
},
{
"db": "ICS CERT",
"id": "ICSA-16-336-02",
"trust": 3.4
},
{
"db": "BID",
"id": "85965",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007643",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201612-037",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-11878",
"trust": 0.6
},
{
"db": "ICS CERT ALERT",
"id": "ICS-ALERT-16-099-01",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-98187",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11878"
},
{
"db": "VULHUB",
"id": "VHN-98187"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007643"
},
{
"db": "NVD",
"id": "CVE-2016-9367"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-037"
}
]
},
"id": "VAR-201702-0595",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11878"
},
{
"db": "VULHUB",
"id": "VHN-98187"
}
],
"trust": 1.596736468
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11878"
}
]
},
"last_update_date": "2023-12-18T12:04:37.333000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
"trust": 0.8,
"url": "http://japan.moxa.com/index.htm"
},
{
"title": "MoxaNPort denial of service vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/84965"
},
{
"title": "Multiple Moxa Nport Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66091"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11878"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007643"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-037"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-400",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98187"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007643"
},
{
"db": "NVD",
"id": "CVE-2016-9367"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/85965"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9367"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9367"
},
{
"trust": 0.3,
"url": "http://www.moxa.com/product/vport_sdk.htm"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11878"
},
{
"db": "VULHUB",
"id": "VHN-98187"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007643"
},
{
"db": "NVD",
"id": "CVE-2016-9367"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-037"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-11878"
},
{
"db": "VULHUB",
"id": "VHN-98187"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007643"
},
{
"db": "NVD",
"id": "CVE-2016-9367"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-037"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11878"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-98187"
},
{
"date": "2016-04-08T00:00:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007643"
},
{
"date": "2017-02-13T21:59:02.267000",
"db": "NVD",
"id": "CVE-2016-9367"
},
{
"date": "2016-04-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-037"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11878"
},
{
"date": "2017-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-98187"
},
{
"date": "2016-12-20T02:04:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007643"
},
{
"date": "2017-02-17T18:11:21.140000",
"db": "NVD",
"id": "CVE-2016-9367"
},
{
"date": "2016-12-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-037"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-037"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Moxa NPort Denial of service in products (DoS) Vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-007643"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-037"
}
],
"trust": 0.6
}
}
VAR-201702-0594
Vulnerability from variot - Updated: 2023-12-18 12:04An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication. MOXANport is a serial communication server. MoxaNPort has an authentication vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-0594",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nport 5600 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5100a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport 6100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5400 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport 5200a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport p5150a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5200 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5100a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5400 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5410",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600-8-dtl series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5630",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650i-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5x50a1-m12 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5150a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5110\u003c2.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5130/5150\u003c3.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5200\u003c2.8"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5400\u003c3.11"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5600\u003c3.7"
},
{
"model": "nport p5150a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5100a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5200a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5150ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5250ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5450ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600-8-dt",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport 5600-8-dtl",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "6x50\u003c1.13.11"
},
{
"model": "nport ia5450a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport 6100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5400 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport p5150a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5200 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport p5150a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport ia5450a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "6x500"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "64501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "62501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61100"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "60000"
},
{
"model": "nport 5x50ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-dt/dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-8-dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "56000"
},
{
"model": "nport 5450ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "54000"
},
{
"model": "nport 5250ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5200a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "52000"
},
{
"model": "nport 5150ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.5"
},
{
"model": "nport 5100a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51000"
},
{
"model": "nport ia5450a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "6x501.14"
},
{
"model": "nport 5600-8-dtl",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5600-8-dt",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "56003.7"
},
{
"model": "nport 5450ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "54003.11"
},
{
"model": "nport 5250ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "52002.8"
},
{
"model": "nport 5150ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.6"
},
{
"model": "nport 5100a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11880"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007642"
},
{
"db": "NVD",
"id": "CVE-2016-9366"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-035"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.13",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9366"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Reid Wightman of Digital Bonds Labs",
"sources": [
{
"db": "BID",
"id": "85965"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-035"
}
],
"trust": 0.9
},
"cve": "CVE-2016-9366",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2016-9366",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-11880",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-98186",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2016-9366",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-9366",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2016-11880",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201612-035",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-98186",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11880"
},
{
"db": "VULHUB",
"id": "VHN-98186"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007642"
},
{
"db": "NVD",
"id": "CVE-2016-9366"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-035"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication. MOXANport is a serial communication server. MoxaNPort has an authentication vulnerability. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9366"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007642"
},
{
"db": "CNVD",
"id": "CNVD-2016-11880"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "VULHUB",
"id": "VHN-98186"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "ICS CERT",
"id": "ICSA-16-336-02",
"trust": 3.4
},
{
"db": "NVD",
"id": "CVE-2016-9366",
"trust": 3.4
},
{
"db": "BID",
"id": "85965",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007642",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201612-035",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-11880",
"trust": 0.6
},
{
"db": "ICS CERT ALERT",
"id": "ICS-ALERT-16-099-01",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-98186",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11880"
},
{
"db": "VULHUB",
"id": "VHN-98186"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007642"
},
{
"db": "NVD",
"id": "CVE-2016-9366"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-035"
}
]
},
"id": "VAR-201702-0594",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11880"
},
{
"db": "VULHUB",
"id": "VHN-98186"
}
],
"trust": 1.596736468
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11880"
}
]
},
"last_update_date": "2023-12-18T12:04:37.181000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
"trust": 0.8,
"url": "http://japan.moxa.com/index.htm"
},
{
"title": "MoxaNPort authentication vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/84968"
},
{
"title": "Multiple Moxa Nport Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66089"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11880"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007642"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-035"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-264",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98186"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007642"
},
{
"db": "NVD",
"id": "CVE-2016-9366"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/85965"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9366"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9366"
},
{
"trust": 0.3,
"url": "http://www.moxa.com/product/vport_sdk.htm"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11880"
},
{
"db": "VULHUB",
"id": "VHN-98186"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007642"
},
{
"db": "NVD",
"id": "CVE-2016-9366"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-035"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-11880"
},
{
"db": "VULHUB",
"id": "VHN-98186"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007642"
},
{
"db": "NVD",
"id": "CVE-2016-9366"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-035"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11880"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-98186"
},
{
"date": "2016-04-08T00:00:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007642"
},
{
"date": "2017-02-13T21:59:02.253000",
"db": "NVD",
"id": "CVE-2016-9366"
},
{
"date": "2016-04-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-035"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11880"
},
{
"date": "2017-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-98186"
},
{
"date": "2016-12-20T02:04:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007642"
},
{
"date": "2017-02-17T18:06:30.847000",
"db": "NVD",
"id": "CVE-2016-9366"
},
{
"date": "2016-12-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-035"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-035"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Moxa NPort Vulnerabilities that can bypass product authentication",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-007642"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-035"
}
],
"trust": 0.6
}
}
VAR-201702-0597
Vulnerability from variot - Updated: 2023-12-18 12:04An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING). plural Moxa NPort The product contains a cross-site scripting vulnerability.A cross-site scripting attack may be performed. MOXANport is a serial communication server. An attacker exploits a vulnerability to initiate a cross-site attack. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. An attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-0597",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nport 5600 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 5100a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport 6100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5400 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport 5200a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport p5150a series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5600-8-dtl series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5200 series",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5100a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5130a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5150a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5200a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5210a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5230a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5232i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5250a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5400 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5410",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5430i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-ct-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450a1-m12-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5450i-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5600-8-dtl series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5610-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5630",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5650i-8-dtl",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 5x50a1-m12 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6100 series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport 6150-t",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5110a",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport p5150a series",
"scope": null,
"trust": 0.8,
"vendor": "moxa",
"version": null
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5110\u003c2.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5130/5150\u003c3.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5200\u003c2.8"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5400\u003c3.11"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5600\u003c3.7"
},
{
"model": "nport p5150a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5100a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5200a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5150ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5250ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5450ai-m12",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600-8-dt",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport 5600-8-dtl",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "6x50\u003c1.13.11"
},
{
"model": "nport ia5450a",
"scope": "lt",
"trust": 0.6,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.5"
},
{
"model": "nport 6100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.13"
},
{
"model": "nport 5600-8-dtl series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.3"
},
{
"model": "nport 5100 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "2.5"
},
{
"model": "nport 5400 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.10"
},
{
"model": "nport p5150a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5100a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5600 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.6"
},
{
"model": "nport 5x50a1-m12 series",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "1.1"
},
{
"model": "nport p5150a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport ia5450a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "6x500"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "66101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "64501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "62501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61501.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61101.13"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "61100"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "60000"
},
{
"model": "nport 5x50ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-dt/dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5600-8-dtl",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "56000"
},
{
"model": "nport 5450ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "54000"
},
{
"model": "nport 5250ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport 5200a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "52000"
},
{
"model": "nport 5150ai-m12",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.5"
},
{
"model": "nport 5100a",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "0"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51000"
},
{
"model": "nport ia5450a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "6x501.14"
},
{
"model": "nport 5600-8-dtl",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport 5600-8-dt",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "56003.7"
},
{
"model": "nport 5450ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "54003.11"
},
{
"model": "nport 5250ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport 5200a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "52002.8"
},
{
"model": "nport 5150ai-m12",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.2"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.6"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.6"
},
{
"model": "nport 5100a",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "1.3"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11882"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007645"
},
{
"db": "NVD",
"id": "CVE-2016-9371"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-033"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.13",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9371"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Reid Wightman of Digital Bonds Labs",
"sources": [
{
"db": "BID",
"id": "85965"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-033"
}
],
"trust": 0.9
},
"cve": "CVE-2016-9371",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-9371",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-11882",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-98191",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 6.1,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2016-9371",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-9371",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2016-11882",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201612-033",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-98191",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11882"
},
{
"db": "VULHUB",
"id": "VHN-98191"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007645"
},
{
"db": "NVD",
"id": "CVE-2016-9371"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-033"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series \u0026 NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING). plural Moxa NPort The product contains a cross-site scripting vulnerability.A cross-site scripting attack may be performed. MOXANport is a serial communication server. An attacker exploits a vulnerability to initiate a cross-site attack. Multiple Moxa NPort products are prone to multiple unspecified security vulnerabilities. \nAn attacker can exploit these issues to bypass security restrictions, perform unauthorized actions, gain escalated privileges and execute arbitrary code in the context of the affected application and cause a denial-of-service condition. Successful exploitation will allow an attacker to take control of the affected system. A remote attacker can exploit this vulnerability to inject arbitrary web script or HTML",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9371"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007645"
},
{
"db": "CNVD",
"id": "CNVD-2016-11882"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "VULHUB",
"id": "VHN-98191"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-9371",
"trust": 3.4
},
{
"db": "ICS CERT",
"id": "ICSA-16-336-02",
"trust": 3.4
},
{
"db": "BID",
"id": "85965",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007645",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201612-033",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-11882",
"trust": 0.6
},
{
"db": "ICS CERT ALERT",
"id": "ICS-ALERT-16-099-01",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-98191",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11882"
},
{
"db": "VULHUB",
"id": "VHN-98191"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007645"
},
{
"db": "NVD",
"id": "CVE-2016-9371"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-033"
}
]
},
"id": "VAR-201702-0597",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11882"
},
{
"db": "VULHUB",
"id": "VHN-98191"
}
],
"trust": 1.596736468
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11882"
}
]
},
"last_update_date": "2023-12-18T12:04:37.290000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
"trust": 0.8,
"url": "http://japan.moxa.com/index.htm"
},
{
"title": "MoxaNPort Cross-Site Scripting Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/84970"
},
{
"title": "Multiple Moxa Nport Fixes for product cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66086"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11882"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007645"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-033"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98191"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007645"
},
{
"db": "NVD",
"id": "CVE-2016-9371"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-02"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/85965"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9371"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-9371"
},
{
"trust": 0.3,
"url": "http://www.moxa.com/product/vport_sdk.htm"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/alerts/ics-alert-16-099-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-11882"
},
{
"db": "VULHUB",
"id": "VHN-98191"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007645"
},
{
"db": "NVD",
"id": "CVE-2016-9371"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-033"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-11882"
},
{
"db": "VULHUB",
"id": "VHN-98191"
},
{
"db": "BID",
"id": "85965"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007645"
},
{
"db": "NVD",
"id": "CVE-2016-9371"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-033"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11882"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-98191"
},
{
"date": "2016-04-08T00:00:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007645"
},
{
"date": "2017-02-13T21:59:02.347000",
"db": "NVD",
"id": "CVE-2016-9371"
},
{
"date": "2016-04-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-033"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-11882"
},
{
"date": "2017-02-17T00:00:00",
"db": "VULHUB",
"id": "VHN-98191"
},
{
"date": "2016-12-20T02:04:00",
"db": "BID",
"id": "85965"
},
{
"date": "2017-03-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007645"
},
{
"date": "2017-02-17T18:08:41.883000",
"db": "NVD",
"id": "CVE-2016-9371"
},
{
"date": "2016-12-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-033"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-033"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Moxa NPort Product cross-site scripting vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-007645"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-033"
}
],
"trust": 0.6
}
}