Search criteria
9 vulnerabilities found for uc-8220-t-lx_firmware by moxa
FKIE_CVE-2023-1257
Vulnerability from fkie_nvd - Published: 2023-03-07 17:15 - Updated: 2024-11-21 07:38
Severity ?
7.6 (High) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
6.8 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system.
References
| URL | Tags | ||
|---|---|---|---|
| ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04 | Third Party Advisory, US Government Resource |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2101-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9476FEEA-D608-40B7-BAD8-D85E3A433114",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2101-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA09978A-2E63-4E29-A693-F0361951FCFF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2102-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B3786680-F178-4ADC-8085-7DC198A7BDE7",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2102-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "053D848E-1BB1-4B91-A205-84F83FE57E8F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2102-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5455BBF9-75C8-4D21-B32E-3CD3C036E001",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2102-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D45B4C7D-A4D9-420D-A878-8ADB724AF24B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2104-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D451BCD-8067-4AA1-9ED4-FFFD37BB0B52",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2104-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C374EE-E4C8-469F-BC45-E43F739D3D23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2111-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EFDF2E-D2B0-4FA5-9060-BC63A8792853",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2111-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F85BA8C3-A65F-4B61-8A94-7B67D236919F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2112-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18404A5F-EF72-4236-B9E0-3BF3EE861B3E",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2112-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C653CF9A-080A-48B1-81F2-B72D2B4A1504",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2114-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDCA0FFC-B0DD-4BED-A39C-6C579F3648A3",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-2114-t-lx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0538BE2C-D4F4-4C26-A2E6-50CF7AFB3E54",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2114-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9862617F-C1E4-4437-98E5-3A9322572C2E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2116-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49F8203C-B1C6-4175-90B0-C3589DB36C25",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2116-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC3535DE-C643-4BB0-A9A4-6B7641570BC1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3101-t-ap-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCCA2B92-FEC5-4B32-8FE6-EBEC9FAE791A",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3101-t-ap-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3549908-B58E-4053-B3B6-709CAEF2E383",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3101-t-eu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07048618-0EC6-407B-AEF0-F44ED5229F2D",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3101-t-eu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F011C44-45F4-4147-9237-793C81EDE740",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3101-t-us-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D9A016-00F0-4488-BCE7-A3BC89C7EE51",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3101-t-us-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C1ECFC-BFAE-41FD-A281-CDF7D4F50308",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-ap-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E030D12F-012D-4CB3-999F-5BB869A4CFE0",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-ap-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4969D5B4-7704-48C2-B6C6-43AAB4FD4609",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-ap-lx-nw_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E80201F-7EF4-43BC-8D43-49C3B5E0CD40",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-ap-lx-nw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B63A3ADE-DFA0-4579-B3CA-4CCDADE0A00D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-eu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E16F237-70FA-4856-882C-D5394BD9AA4B",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-eu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3827809F-C307-46E7-AE94-D108407B81FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-eu-lx-nw_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20A7D0F9-ADF9-4598-A47D-AD0151B7C041",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-eu-lx-nw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C400E9A7-C51B-476F-97B4-5B269A922231",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-us-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CA63341-F990-4A60-AD4B-538C2CC9E046",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-us-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5EF2E7B-586A-42DD-A202-068CE7B3495E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-us-lx-nw_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD3A8DEA-536F-4F85-B686-2201CCF3B16A",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-us-lx-nw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51BBEAAB-C051-46CC-A7B8-D48BA272775A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3121-t-ap-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0DBB564-6A91-471F-8494-ABEF4B997180",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3121-t-ap-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B57685-91FC-4125-9C30-5FDD8A049381",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3121-t-eu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A011FC-7361-4D20-96E7-5AD06EB76960",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3121-t-eu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B249A63B-AC3E-4342-A7B8-4FF05B0ACC33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3121-t-us-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3661F92D-3F5A-43E6-A7FA-57E25283CCCD",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3121-t-us-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F22B234A-8AA0-4CB5-AF97-74320919DCF3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5101-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "60187707-601B-4C5F-A650-4622A8377917",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5101-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB51C37-B6B7-4D1B-B4A5-5A5CBC1DC0DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5101-t-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48FAD68E-A7ED-4217-ABAD-5B2311B47995",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5101-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03DAAE8E-16DF-4046-9867-86105DB279AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5102-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4E59C5D5-0000-460C-BDEC-33A03414BAD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5102-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C156071-5FA1-43EF-97CF-98385375D8B0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5102-t-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F6D2831E-83C3-4B34-9611-41562214435C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5102-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "286A88C3-FD36-4241-8C48-A54332302050",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5111-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "98092E25-C6F3-4B4D-813C-9DAE24847B2A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5111-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E555662F-D557-4337-B490-C53AF0B2A8C7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5111-t-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CE66A6B2-1C39-4142-A844-F9498C517E29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5111-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DACA16B7-CAD0-4362-916A-A3A85F09B3F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5112-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0E9EABBB-B08E-405A-AC9F-40B4F9A0B252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5112-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF9A229-827B-471B-859A-CF51BD469A64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5112-t-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F9636961-2636-4894-8F0F-67DB2532A0DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5112-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F055724-0BEA-47A7-B8D3-5C5A7AFA5972",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8112-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "266939EB-1BAF-4956-9E80-AE3E8D33079F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8112-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7129CF3-628A-46C5-865B-9ADCC0658C03",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8131-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E3A0029F-3F54-45E8-A692-C4359D32C638",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8131-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A10928A2-9245-40DC-B8FD-41CCB35D22C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8132-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4363C3E4-490D-4B7A-ACBE-69D30C1BB632",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8132-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C14FDB09-7888-4648-8E35-C1FA14EE7541",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8162-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3B08DFFC-C86F-45CD-B42B-472DEE477FDC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8162-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "732AEFCC-7231-4788-869B-25B9247E52FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8112-me-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0BBD4A9F-D4FB-4FD1-B55E-0D1A3B1C94AF",
"versionEndIncluding": "1.1",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8112-me-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6845A55-EE87-4A16-851A-9811D895ED3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8112-me-t-lx1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67EB6C4F-3C33-4482-AE39-3961C136C44C",
"versionEndIncluding": "1.1",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8112-me-t-lx1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BEEE468-A757-47A2-A7D4-E1C1C156D5A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8112a-me-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AEAD531B-D5EA-4C97-B928-2C2E133C3D32",
"versionEndIncluding": "1.1",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8112a-me-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2F0871-28EA-4625-8389-E89A8D023A15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8210-t-lx-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "932D7E88-2240-4911-AB0A-DEC2EDF7E4A6",
"versionEndIncluding": "2.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8210-t-lx-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53104CD8-0DF4-46E5-87F1-B5810EB1B79E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA04BED1-4FEB-462D-A5C7-E2019EC9B09D",
"versionEndIncluding": "2.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D65808DD-2672-42D7-8544-8A9E0D1519E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx-ap-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E8FFABB-6B68-43D6-8A96-83E0C6272148",
"versionEndIncluding": "2.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx-ap-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC404D8-D558-462F-898F-9CFE54330FD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx-eu-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2D62E4E9-6B28-4EF4-9628-F64CAF29676B",
"versionEndIncluding": "2.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx-eu-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5D493C8-E0E4-4C2B-8A95-66DB61BD7035",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84E1A143-3118-4BAC-A19C-7743B3161349",
"versionEndIncluding": "2.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AA15CCF-BFF5-4902-9654-195E0C67FC65",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx-us-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9330358B-65D2-4688-B515-306E64B8712C",
"versionEndIncluding": "2.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx-us-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "726EC056-8BC7-4ACC-A6FF-7E7664859B03",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8410a-lx_firmware:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "88F0611D-16FB-4D67-BF72-8A699B74A122",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8410a-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08B660E3-EDC3-46F1-9B7C-27DF6C9361F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8410a-nw-lx_firmware:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8109CE-4B8B-4F18-9391-E0A41E043DD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8410a-nw-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B6C0056-578C-4429-8A1E-7638D5C1CCEB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8410a-nw-t-lx_firmware:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "13B14B96-CD23-4C02-8930-B1E0B630A06F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8410a-nw-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26D38C84-9329-4320-B435-9F29A48EA06D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8410a-t-lx_firmware:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D6BA840-B9E6-43FA-AB37-292D41DA6828",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8410a-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2B1263-2F49-43BF-AE2A-631F252E2820",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8540-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57F35CCC-B7C4-4707-A743-C744D2CC70BA",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8540-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9297DE42-0B5E-4BE4-9773-0583DA4CAB2D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8540-t-ct-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7AED57E6-C50B-4C29-B780-C87ECE75D885",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8540-t-ct-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "848FF5D2-6EC9-43E4-8CDF-2EEAA20AEB3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8540-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F818E8C-445E-409D-9ECC-FE0E25078D51",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8540-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25F11CDF-4D2A-4A85-B50D-A7754279BDD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A3DD9BB-5D69-4CDB-A942-5E81983EF6ED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A766734-2683-439D-8814-C0989B082CEE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-q-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DBD5C0D4-F18D-4AC8-B9E4-30E512D0BD78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-q-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36C4FE9E-9767-45A8-A585-F1641746BFBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-ct-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52447718-73AB-40DB-B576-FFBC31F0FAB8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-t-ct-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B306C0E-4807-4870-B836-7250F0A9F036",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-ct-q-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38BA48C0-B99D-41BF-BDDE-AFC366884A2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-t-ct-q-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDBC0E20-0DA0-4724-B515-7FFBAF3FA2EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7D6EF904-345E-43FB-BBA7-B4BAA4214A46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E10983BA-E998-481E-A994-6D48DB986089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-q-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F0D7D9-FDE5-4EB4-9C21-2ECF89591320",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-t-q-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F238A13-893F-426F-BF29-48DDE9AFE2BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device\u2019s authentication files to create a new user and gain full access to the system."
}
],
"id": "CVE-2023-1257",
"lastModified": "2024-11-21T07:38:46.613",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 6.0,
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-03-07T17:15:12.527",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified"
}
FKIE_CVE-2022-3086
Vulnerability from fkie_nvd - Published: 2022-12-02 20:15 - Updated: 2024-11-21 07:18
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
7.6 (High) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
7.6 (High) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Summary
Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable
to shell escape, which enables local attackers with non-superuser
credentials to gain full, unrestrictive shell access which may allow an
attacker to execute arbitrary code.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7D6EF904-345E-43FB-BBA7-B4BAA4214A46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E10983BA-E998-481E-A994-6D48DB986089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-ct-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52447718-73AB-40DB-B576-FFBC31F0FAB8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-t-ct-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B306C0E-4807-4870-B836-7250F0A9F036",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-q-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F0D7D9-FDE5-4EB4-9C21-2ECF89591320",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-t-q-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F238A13-893F-426F-BF29-48DDE9AFE2BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-ct-q-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38BA48C0-B99D-41BF-BDDE-AFC366884A2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-t-ct-q-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDBC0E20-0DA0-4724-B515-7FFBAF3FA2EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-q-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DBD5C0D4-F18D-4AC8-B9E4-30E512D0BD78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-q-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36C4FE9E-9767-45A8-A585-F1641746BFBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A3DD9BB-5D69-4CDB-A942-5E81983EF6ED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A766734-2683-439D-8814-C0989B082CEE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8540-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57F35CCC-B7C4-4707-A743-C744D2CC70BA",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8540-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9297DE42-0B5E-4BE4-9773-0583DA4CAB2D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8540-t-ct-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7AED57E6-C50B-4C29-B780-C87ECE75D885",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8540-t-ct-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "848FF5D2-6EC9-43E4-8CDF-2EEAA20AEB3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8540-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F818E8C-445E-409D-9ECC-FE0E25078D51",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8540-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25F11CDF-4D2A-4A85-B50D-A7754279BDD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8410a-lx_firmware:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "88F0611D-16FB-4D67-BF72-8A699B74A122",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8410a-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08B660E3-EDC3-46F1-9B7C-27DF6C9361F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8410a-nw-lx_firmware:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8109CE-4B8B-4F18-9391-E0A41E043DD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8410a-nw-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B6C0056-578C-4429-8A1E-7638D5C1CCEB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8410a-nw-t-lx_firmware:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "13B14B96-CD23-4C02-8930-B1E0B630A06F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8410a-nw-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26D38C84-9329-4320-B435-9F29A48EA06D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8410a-t-lx_firmware:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D6BA840-B9E6-43FA-AB37-292D41DA6828",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8410a-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2B1263-2F49-43BF-AE2A-631F252E2820",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8210-t-lx-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "932D7E88-2240-4911-AB0A-DEC2EDF7E4A6",
"versionEndIncluding": "2.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8210-t-lx-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53104CD8-0DF4-46E5-87F1-B5810EB1B79E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA04BED1-4FEB-462D-A5C7-E2019EC9B09D",
"versionEndIncluding": "2.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D65808DD-2672-42D7-8544-8A9E0D1519E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx-us-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9330358B-65D2-4688-B515-306E64B8712C",
"versionEndIncluding": "2.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx-us-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "726EC056-8BC7-4ACC-A6FF-7E7664859B03",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx-eu-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2D62E4E9-6B28-4EF4-9628-F64CAF29676B",
"versionEndIncluding": "2.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx-eu-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5D493C8-E0E4-4C2B-8A95-66DB61BD7035",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx-ap-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E8FFABB-6B68-43D6-8A96-83E0C6272148",
"versionEndIncluding": "2.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx-ap-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC404D8-D558-462F-898F-9CFE54330FD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8112a-me-t-lx_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF220E22-4564-4BED-B656-CDEEB2C15916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8112a-me-t-lx_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF3AC40-75B3-4955-9896-30A4CEBD9B37",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8112a-me-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2F0871-28EA-4625-8389-E89A8D023A15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8131-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E3A0029F-3F54-45E8-A692-C4359D32C638",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8131-lx_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4130112B-F894-46F0-98F5-3AD0654C6D77",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8131-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A10928A2-9245-40DC-B8FD-41CCB35D22C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8132-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4363C3E4-490D-4B7A-ACBE-69D30C1BB632",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8132-lx_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7C44D70F-5079-436E-922B-82BB536A8C73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8132-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C14FDB09-7888-4648-8E35-C1FA14EE7541",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8162-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3B08DFFC-C86F-45CD-B42B-472DEE477FDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8162-lx_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D73A2A3B-0EFB-4F3C-82ED-65F0F34589FE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8162-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "732AEFCC-7231-4788-869B-25B9247E52FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8112-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "266939EB-1BAF-4956-9E80-AE3E8D33079F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8112-lx_firmware:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0211D4E8-BE99-417E-B124-DC91F1F61C41",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8112-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7129CF3-628A-46C5-865B-9ADCC0658C03",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5101-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "60187707-601B-4C5F-A650-4622A8377917",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5101-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB51C37-B6B7-4D1B-B4A5-5A5CBC1DC0DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5101-t-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48FAD68E-A7ED-4217-ABAD-5B2311B47995",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5101-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03DAAE8E-16DF-4046-9867-86105DB279AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5102-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4E59C5D5-0000-460C-BDEC-33A03414BAD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5102-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C156071-5FA1-43EF-97CF-98385375D8B0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5102-t-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F6D2831E-83C3-4B34-9611-41562214435C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5102-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "286A88C3-FD36-4241-8C48-A54332302050",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5111-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "98092E25-C6F3-4B4D-813C-9DAE24847B2A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5111-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E555662F-D557-4337-B490-C53AF0B2A8C7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5111-t-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CE66A6B2-1C39-4142-A844-F9498C517E29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5111-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DACA16B7-CAD0-4362-916A-A3A85F09B3F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5112-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0E9EABBB-B08E-405A-AC9F-40B4F9A0B252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5112-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF9A229-827B-471B-859A-CF51BD469A64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5112-t-lx_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F9636961-2636-4894-8F0F-67DB2532A0DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5112-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F055724-0BEA-47A7-B8D3-5C5A7AFA5972",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3101-t-ap-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCCA2B92-FEC5-4B32-8FE6-EBEC9FAE791A",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3101-t-ap-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3549908-B58E-4053-B3B6-709CAEF2E383",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3101-t-eu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07048618-0EC6-407B-AEF0-F44ED5229F2D",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3101-t-eu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F011C44-45F4-4147-9237-793C81EDE740",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3101-t-us-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D9A016-00F0-4488-BCE7-A3BC89C7EE51",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3101-t-us-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C1ECFC-BFAE-41FD-A281-CDF7D4F50308",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-ap-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E030D12F-012D-4CB3-999F-5BB869A4CFE0",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-ap-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4969D5B4-7704-48C2-B6C6-43AAB4FD4609",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-ap-lx-nw_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E80201F-7EF4-43BC-8D43-49C3B5E0CD40",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-ap-lx-nw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B63A3ADE-DFA0-4579-B3CA-4CCDADE0A00D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-eu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E16F237-70FA-4856-882C-D5394BD9AA4B",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-eu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3827809F-C307-46E7-AE94-D108407B81FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-eu-lx-nw_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20A7D0F9-ADF9-4598-A47D-AD0151B7C041",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-eu-lx-nw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C400E9A7-C51B-476F-97B4-5B269A922231",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-us-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CA63341-F990-4A60-AD4B-538C2CC9E046",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-us-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5EF2E7B-586A-42DD-A202-068CE7B3495E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-us-lx-nw_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD3A8DEA-536F-4F85-B686-2201CCF3B16A",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-us-lx-nw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51BBEAAB-C051-46CC-A7B8-D48BA272775A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3121-t-ap-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0DBB564-6A91-471F-8494-ABEF4B997180",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3121-t-ap-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B57685-91FC-4125-9C30-5FDD8A049381",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3121-t-eu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A011FC-7361-4D20-96E7-5AD06EB76960",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3121-t-eu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B249A63B-AC3E-4342-A7B8-4FF05B0ACC33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3121-t-us-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3661F92D-3F5A-43E6-A7FA-57E25283CCCD",
"versionEndIncluding": "2.0",
"versionStartIncluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3121-t-us-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F22B234A-8AA0-4CB5-AF97-74320919DCF3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2101-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9476FEEA-D608-40B7-BAD8-D85E3A433114",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2101-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA09978A-2E63-4E29-A693-F0361951FCFF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2102-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B3786680-F178-4ADC-8085-7DC198A7BDE7",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2102-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "053D848E-1BB1-4B91-A205-84F83FE57E8F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2104-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D451BCD-8067-4AA1-9ED4-FFFD37BB0B52",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2104-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C374EE-E4C8-469F-BC45-E43F739D3D23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2111-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EFDF2E-D2B0-4FA5-9060-BC63A8792853",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2111-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F85BA8C3-A65F-4B61-8A94-7B67D236919F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2112-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18404A5F-EF72-4236-B9E0-3BF3EE861B3E",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2112-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C653CF9A-080A-48B1-81F2-B72D2B4A1504",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2114-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDCA0FFC-B0DD-4BED-A39C-6C579F3648A3",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2114-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9862617F-C1E4-4437-98E5-3A9322572C2E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2114-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDCA0FFC-B0DD-4BED-A39C-6C579F3648A3",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2114-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9862617F-C1E4-4437-98E5-3A9322572C2E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2116-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49F8203C-B1C6-4175-90B0-C3589DB36C25",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2116-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC3535DE-C643-4BB0-A9A4-6B7641570BC1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable \nto shell escape, which enables local attackers with non-superuser \ncredentials to gain full, unrestrictive shell access which may allow an \nattacker to execute arbitrary code.\n\n"
},
{
"lang": "es",
"value": "Cradlepoint IBR600 NCOS versiones 6.5.0.160bc2e y anteriores son vulnerables al escape del shell, lo que permite a atacantes locales con credenciales que no sean de superusuario obtener acceso completo y sin restricciones al shell, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario."
}
],
"id": "CVE-2022-3086",
"lastModified": "2024-11-21T07:18:47.650",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-12-02T20:15:13.767",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-02"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
}
]
}
FKIE_CVE-2022-3088
Vulnerability from fkie_nvd - Published: 2022-11-28 22:15 - Updated: 2024-11-21 07:18
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12, UC-3100 System Image: Versions v1.0 to v1.6, UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa's ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges.
References
| URL | Tags | ||
|---|---|---|---|
| ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05 | Third Party Advisory, US Government Resource |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2101-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82A95780-DA57-4CF4-BCD8-9298BDDD705D",
"versionEndIncluding": "1.12",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2101-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA09978A-2E63-4E29-A693-F0361951FCFF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2102-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35B8CD12-EE1E-47D9-9780-D25DDA1B8AE1",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2102-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "053D848E-1BB1-4B91-A205-84F83FE57E8F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2104-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA658647-BCC7-44F8-AFC2-1511FB5B229C",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2104-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C374EE-E4C8-469F-BC45-E43F739D3D23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2111-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5064B21-4C23-41B0-A367-673ACEF43ED8",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2111-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F85BA8C3-A65F-4B61-8A94-7B67D236919F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2112-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B36C151E-7226-47A3-AF30-73A16523080D",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2112-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C653CF9A-080A-48B1-81F2-B72D2B4A1504",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2102-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37CB9D16-448B-4D38-B73A-7EC2D463B90C",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2102-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D45B4C7D-A4D9-420D-A878-8ADB724AF24B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2114-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB9AC0E-2426-47E0-84D6-0EC46564A701",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2114-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9862617F-C1E4-4437-98E5-3A9322572C2E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-2116-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81146119-4408-4303-8D02-71649C2E5E0B",
"versionEndIncluding": "1.2",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-2116-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC3535DE-C643-4BB0-A9A4-6B7641570BC1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3101-t-us-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70C07F0C-26EB-4704-94DB-CFE0ABDFABAD",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3101-t-us-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C1ECFC-BFAE-41FD-A281-CDF7D4F50308",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3101-t-eu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "940A9E9F-73E4-4FDA-99CF-336CD08B3EA0",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3101-t-eu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F011C44-45F4-4147-9237-793C81EDE740",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-us-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78275480-E976-4AE3-AF09-DEDD423A8ADE",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-us-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5EF2E7B-586A-42DD-A202-068CE7B3495E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-eu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BC0C744-609B-4D1C-9713-B6D5CB399E6D",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-eu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3827809F-C307-46E7-AE94-D108407B81FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3121-t-us-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22B0CD97-A115-4663-ADC1-D790884F52FA",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3121-t-us-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F22B234A-8AA0-4CB5-AF97-74320919DCF3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3121-t-eu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE825E93-D508-4AD2-A7AE-FA10D0D910FB",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3121-t-eu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B249A63B-AC3E-4342-A7B8-4FF05B0ACC33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3101-t-ap-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC9E571C-271A-4A15-912D-5A7D5AFBBDA1",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3101-t-ap-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3549908-B58E-4053-B3B6-709CAEF2E383",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-ap-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "388D5633-5FCB-4EC9-B40C-F0034329CB55",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-ap-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4969D5B4-7704-48C2-B6C6-43AAB4FD4609",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3121-t-ap-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50C009F4-1440-44B5-B557-192D80F13BA3",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3121-t-ap-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B57685-91FC-4125-9C30-5FDD8A049381",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-eu-lx-nw_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69102C8C-DD75-4B81-BED4-FD1A9F4299A6",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-eu-lx-nw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C400E9A7-C51B-476F-97B4-5B269A922231",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-ap-lx-nw_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99BDDE80-5306-4003-800A-4D26A49AD44D",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-ap-lx-nw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B63A3ADE-DFA0-4579-B3CA-4CCDADE0A00D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-3111-t-us-lx-nw_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0EBE7629-E1A6-431E-9E31-7C81F2E98D0E",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-3111-t-us-lx-nw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51BBEAAB-C051-46CC-A7B8-D48BA272775A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5101-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62A556C9-3CBA-4438-9F0F-B89ED069CAFE",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5101-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB51C37-B6B7-4D1B-B4A5-5A5CBC1DC0DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5101-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF9934BC-0EF2-4B60-B574-72557C4D2B31",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5101-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03DAAE8E-16DF-4046-9867-86105DB279AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5102-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8277DEB2-19AD-4409-8093-9D17DCEEBE1D",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5102-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C156071-5FA1-43EF-97CF-98385375D8B0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5102-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "437DC6E0-8A5C-4700-B45C-3250135DB602",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5102-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "286A88C3-FD36-4241-8C48-A54332302050",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5111-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE4F803-3276-42A7-9B8F-164C0781FDD5",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5111-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E555662F-D557-4337-B490-C53AF0B2A8C7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5111-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF276820-3CBE-40A7-A195-9DA41D49FCB7",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5111-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DACA16B7-CAD0-4362-916A-A3A85F09B3F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5112-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67322925-CFEA-48FA-9956-CE095F652554",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5112-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF9A229-827B-471B-859A-CF51BD469A64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-5112-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5557F1B3-B157-46DB-8D46-7D1DE5B4C4AD",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-5112-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F055724-0BEA-47A7-B8D3-5C5A7AFA5972",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8131-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A26AC4C2-A9B4-4716-9968-A6873D77CC53",
"versionEndIncluding": "3.5",
"versionStartIncluding": "3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8131-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A10928A2-9245-40DC-B8FD-41CCB35D22C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8132-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "926817FE-6DB8-4A72-8717-E2BFFFD3797E",
"versionEndIncluding": "3.5",
"versionStartIncluding": "3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8132-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C14FDB09-7888-4648-8E35-C1FA14EE7541",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8162-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6006D7E2-3333-4753-8F50-151F95010161",
"versionEndIncluding": "3.5",
"versionStartIncluding": "3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8162-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "732AEFCC-7231-4788-869B-25B9247E52FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8112-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC0D0B2-B6C6-4D85-801F-F3E1D0B1D880",
"versionEndIncluding": "3.5",
"versionStartIncluding": "3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8112-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7129CF3-628A-46C5-865B-9ADCC0658C03",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8112-me-t-lx1_firmware:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7150FF1-CB84-4333-919E-EEB724BE5811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8112-me-t-lx1_firmware:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7DCDE80-2B4B-4471-803F-00A22F2DBFC4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8112-me-t-lx1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BEEE468-A757-47A2-A7D4-E1C1C156D5A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8112-me-t-lx_firmware:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "891BE1A5-D271-4FFF-9B2E-781B7468090E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8112-me-t-lx_firmware:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "89969730-202D-45BC-8F4B-D58F07CA6837",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8112-me-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6845A55-EE87-4A16-851A-9811D895ED3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8112a-me-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C981788-D492-4C98-90D8-FB3E1CC6F2E8",
"versionEndIncluding": "1.6",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8112a-me-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2F0871-28EA-4625-8389-E89A8D023A15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1B52909-8D70-4D08-8FB9-A1E9D065A33E",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AA15CCF-BFF5-4902-9654-195E0C67FC65",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "567F7467-599E-4791-845D-A738AB88619D",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D65808DD-2672-42D7-8544-8A9E0D1519E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx-us-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A68B62A-7F2B-4E0F-B19F-5302D26DAC2F",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx-us-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "726EC056-8BC7-4ACC-A6FF-7E7664859B03",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx-eu-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "399E3AB3-AB37-41CD-B6C2-EE74A3934F58",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx-eu-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5D493C8-E0E4-4C2B-8A95-66DB61BD7035",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8220-t-lx-ap-s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C40499-C4D6-40B8-ABDC-3F0017D561AA",
"versionEndIncluding": "1.5",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8220-t-lx-ap-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC404D8-D558-462F-898F-9CFE54330FD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:aig-301-t-us-azu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F87F6520-23D3-4507-AE36-4DAED16A89DC",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:aig-301-t-us-azu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22EDD7CD-C868-47BE-9804-CC380825D101",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:aig-301-t-eu-azu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F24BD78F-9F0B-48A5-B43C-8D63C21A93AF",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:aig-301-t-eu-azu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B21981D-A11E-47E4-97FA-BC32CAB108EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:aig-301-t-ap-azu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3255F466-441A-4C23-AF19-B6C280F26682",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:aig-301-t-ap-azu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7CDBA9-8884-4A0A-B935-3F778E4D02E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:aig-301-t-cn-azu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2D26944A-7A5B-4220-9275-F03C429875DA",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:aig-301-t-cn-azu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B04FDEF-216F-44C5-A7C4-CA9F4F190B57",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:aig-301-t-azu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE307ADF-9031-4538-9428-BD5BFB909472",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:aig-301-t-azu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "167BCD50-0459-4A18-A732-9BB97B0BF89D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:aig-301-azu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF686721-62C8-4CAA-A877-D944ABEB947A",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:aig-301-azu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB592D9-E965-46B1-86B5-D8E458679F86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:aig-301-us-azu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1293AA12-1E27-49CC-9ABE-71A49AD86CD0",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:aig-301-us-azu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAAF14E7-432C-4E0B-BB69-E4276D46A459",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:aig-301-eu-azu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11695165-85D4-4951-99F4-AC1848091BBB",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:aig-301-eu-azu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB29D0B7-D529-4462-97FF-87788F95E6D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:aig-301-ap-azu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "65472D58-58CB-4FD5-A10B-50C47C5FAAD9",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:aig-301-ap-azu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "326E0036-C2CB-42A5-9099-301AD09431E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:aig-301-cn-azu-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CCF641-A28A-46AC-995F-916971F38541",
"versionEndIncluding": "1.4",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:aig-301-cn-azu-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C764E5E-4EFC-42A0-AA6D-75F9D7748D66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8410a-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA6F056F-C2FD-4CE9-B2C6-A5B789809B73",
"versionEndIncluding": "4.1.2",
"versionStartIncluding": "4.0.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8410a-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08B660E3-EDC3-46F1-9B7C-27DF6C9361F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8410a-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF8F8F2-8431-4B64-9ED3-53C5DDD2684C",
"versionEndIncluding": "4.1.2",
"versionStartIncluding": "4.0.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8410a-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2B1263-2F49-43BF-AE2A-631F252E2820",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8410a-nw-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54841BEC-E835-4F46-B3B1-0A3700E573EA",
"versionEndIncluding": "4.1.2",
"versionStartIncluding": "4.0.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8410a-nw-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B6C0056-578C-4429-8A1E-7638D5C1CCEB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8410a-nw-t-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C413DB9-5CF3-49C0-85B7-48DE54FF4BFA",
"versionEndIncluding": "4.1.2",
"versionStartIncluding": "4.0.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8410a-nw-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26D38C84-9329-4320-B435-9F29A48EA06D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-lx_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F85FE95A-314B-4D51-8A83-F44DC0CE5D32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8580-lx_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D15B8DEB-B6CE-406E-A6DB-0FF20E4B646E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A766734-2683-439D-8814-C0989B082CEE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-lx_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D44D2D55-F791-4DAE-A0FD-B221806B00F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-lx_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B92388BD-E850-4F9B-84E9-E63C49CE9599",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E10983BA-E998-481E-A994-6D48DB986089",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-ct-lx_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E46608-A0C6-4415-9ECB-A50D5B372386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-ct-lx_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8DB2785-B95C-4469-9300-4DA686BB55A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-t-ct-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B306C0E-4807-4870-B836-7250F0A9F036",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-q-lx_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C64280FC-5B1A-44C0-BB0A-C9421DCE6825",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8580-q-lx_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2EB1B9FC-7EA6-489C-AC73-727494502CDC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-q-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36C4FE9E-9767-45A8-A585-F1641746BFBB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-q-lx_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43E26664-5828-4799-95A2-D5BD2600FEDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-q-lx_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FD8BF357-A572-47F2-A721-7C41E41523C8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-t-q-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F238A13-893F-426F-BF29-48DDE9AFE2BE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-ct-q-lx_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EEDD6758-BB65-42C1-84D9-1F479D828A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8580-t-ct-q-lx_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EC173EEF-B508-451E-912E-4BD7FF529F1B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8580-t-ct-q-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDBC0E20-0DA0-4724-B515-7FFBAF3FA2EC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8540-lx_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "56098FF1-8B57-49C3-B72A-C6CAE6DEBCD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8540-lx_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0997D2AC-06C9-49EF-81D1-0D717536EB5E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8540-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9297DE42-0B5E-4BE4-9773-0583DA4CAB2D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8540-t-lx_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "480722DC-2DBB-43AC-A61E-8DDFC3449975",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8540-t-lx_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8CBEB056-6309-41B1-BCE5-69EDC1C1BA0C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8540-t-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25F11CDF-4D2A-4A85-B50D-A7754279BDD1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:uc-8540-t-ct-lx_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "337186CB-CDCE-4B29-A177-C9E157FD0594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:moxa:uc-8540-t-ct-lx_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE4DDCB-410F-4505-95DE-7DAF04BA6E54",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:uc-8540-t-ct-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "848FF5D2-6EC9-43E4-8CDF-2EEAA20AEB3A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:da-662c-16-lx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AA6D657-9B9F-4E7C-B43B-3207D42C134B",
"versionEndIncluding": "1.1.2",
"versionStartIncluding": "1.0.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:da-662c-16-lx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34D24EC0-A5E7-4207-8E0E-3D5320914BFA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12,\u0026nbsp;UC-3100 System Image: Versions v1.0 to v1.6,\u0026nbsp;UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa\u0027s ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges."
},
{
"lang": "es",
"value": "System Image UC-8100A-ME-T: Versiones v1.0 a v1.6, \nSystem Image UC-2100: Versiones v1.0 a v1.12, \nSystem Image UC-2100-W: Versiones v1.0 a v 1.12, \nSystem Image UC-3100: versiones v1.0 a v1.6, \nSystem Image UC-5100: versiones v1.0 a v1.4, \nSystem Image UC-8100: versiones v3.0 a v3.5, \nSystem Image UC-8100-ME-T: Versiones v3.0 y v3.1, \nSystem Image UC-8200: v1.0 a v1.5,\nSystem Image AIG-300: v1.0 a v1.4, \nSystem Image UC-8410A con Debian 9: Versiones v4.0.2 y v4.1.2, \nSystem Image UC-8580 con Debian 9: Versiones v2.0 y v2.1, \nSystem Image UC-8540 con Debian 9: Versiones v2.0 y v2.1, y \nSystem Image DA -662C-16-LX (GLB): Las versiones v1.0.2 a v1.1.2 \nLas m\u00e1quinas basadas en ARM de Moxa tienen una vulnerabilidad de ejecuci\u00f3n con privilegios innecesarios, lo que podr\u00eda permitir que un atacante con privilegios de nivel de usuario obtenga privilegios de root."
}
],
"id": "CVE-2022-3088",
"lastModified": "2024-11-21T07:18:47.987",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-11-28T22:15:10.783",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-250"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
CVE-2023-1257 (GCVE-0-2023-1257)
Vulnerability from cvelistv5 – Published: 2023-03-07 16:54 – Updated: 2025-01-16 21:55
VLAI?
Title
CVE-2023-1257
Summary
An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system.
Severity ?
7.6 (High)
CWE
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| MOXA | UC-8580 Series |
Affected:
V1.1
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:40:59.879Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-1257",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-16T20:31:37.359721Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-16T21:55:20.265Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "UC-8580 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.1"
}
]
},
{
"product": "UC-8540 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.0 to V1.2"
}
]
},
{
"product": "UC-8410A Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V2.2"
}
]
},
{
"product": "UC-8200 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.0 to V2.4"
}
]
},
{
"product": "UC-8100A-ME-T Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.0 to V1.1"
}
]
},
{
"product": "UC-8100 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.2"
}
]
},
{
"product": "UC-5100 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.2"
}
]
},
{
"product": "UC-3100 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.2 to V2.0"
}
]
},
{
"product": "UC-2100 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.3 to V1.5"
}
]
},
{
"product": "UC-2100-W Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.3 to V1.5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device\u2019s authentication files to create a new user and gain full access to the system."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-1263",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-03-07T16:54:21.053Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "CVE-2023-1257",
"x_generator": {
"engine": "VINCE 2.0.6",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2023-1257"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2023-1257",
"datePublished": "2023-03-07T16:54:21.053Z",
"dateReserved": "2023-03-07T16:16:20.728Z",
"dateUpdated": "2025-01-16T21:55:20.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-3086 (GCVE-0-2022-3086)
Vulnerability from cvelistv5 – Published: 2022-11-29 00:00 – Updated: 2025-04-16 17:42
VLAI?
Title
Cradlepoint IBR600 Command Injection
Summary
Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable
to shell escape, which enables local attackers with non-superuser
credentials to gain full, unrestrictive shell access which may allow an
attacker to execute arbitrary code.
Severity ?
7.1 (High)
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cradlepoint | IBR600 |
Affected:
0 , ≤ 6.5.0.160bc2e
(custom)
|
Credits
Uri Katz of Claroty Research reported these vulnerabilities to CISA.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:00:10.222Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-02"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-3086",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-16T17:25:49.176863Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-16T17:42:11.399Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"NetCloud OS (NCOS)"
],
"product": "IBR600 ",
"vendor": "Cradlepoint",
"versions": [
{
"lessThanOrEqual": "6.5.0.160bc2e",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Uri Katz of Claroty Research reported these vulnerabilities to CISA."
}
],
"datePublic": "2022-11-17T23:32:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\nCradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable \nto shell escape, which enables local attackers with non-superuser \ncredentials to gain full, unrestrictive shell access which may allow an \nattacker to execute arbitrary code.\n\n"
}
],
"value": "Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable \nto shell escape, which enables local attackers with non-superuser \ncredentials to gain full, unrestrictive shell access which may allow an \nattacker to execute arbitrary code.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-07T23:34:24.434Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-02"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\u003cp\u003eCradlepoint recommends users to update to at least version: \u003c/p\u003e\n\n\u003cul\u003e\u003cli\u003eNCOS v7.22.70\u003c/li\u003e\n\u003c/ul\u003e\u003cp\u003eNCOS release 7.1.0 and greater are no longer available for \nmanual or offline download and are performed via the NetCloud Manager, \nwhich requires a subscription. For more information and NCOS upgrade \nbest practices visit \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://cradlepoint.com/products/netcloud-service/\"\u003eCradlepoint Netcloud Service\u003c/a\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e.\u003c/span\u003e\u003c/p\u003e\n\n\u003cp\u003eFor more information about the latest update, see the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://d2c9o94y5j661e.cloudfront.net/FW-ReleaseNotesNCOS7.22.70-050722.pdf\"\u003eCradlepoint Release Notes\u003c/a\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e.\u003c/span\u003e\u003c/p\u003e"
}
],
"value": "Cradlepoint recommends users to update to at least version: \n\n\n\n * NCOS v7.22.70\n\n\n\nNCOS release 7.1.0 and greater are no longer available for \nmanual or offline download and are performed via the NetCloud Manager, \nwhich requires a subscription. For more information and NCOS upgrade \nbest practices visit Cradlepoint Netcloud Service https://cradlepoint.com/products/netcloud-service/ .\n\n\n\nFor more information about the latest update, see the Cradlepoint Release Notes https://d2c9o94y5j661e.cloudfront.net/FW-ReleaseNotesNCOS7.22.70-050722.pdf .\n\n"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Cradlepoint IBR600 Command Injection",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2022-3086",
"datePublished": "2022-11-29T00:00:00.000Z",
"dateReserved": "2022-09-01T00:00:00.000Z",
"dateUpdated": "2025-04-16T17:42:11.399Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-3088 (GCVE-0-2022-3088)
Vulnerability from cvelistv5 – Published: 2022-11-22 00:00 – Updated: 2025-04-16 17:42
VLAI?
Summary
UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12, UC-3100 System Image: Versions v1.0 to v1.6, UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa's ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges.
Severity ?
7.8 (High)
CWE
- CWE-250 - Execution with Unnecessary Privileges
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Moxa | UC-8100A-ME-T System Imaage |
Affected:
1.0 , ≤ 1.6
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
En Garde ICSRange research team reported this vulnerability to CISA.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:00:10.008Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-3088",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-16T17:25:51.797778Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-16T17:42:25.272Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "UC-8100A-ME-T System Imaage",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "UC-2100 System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.12",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "UC-2100-W System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.12",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "UC-3100 System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "UC-5100 System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.4",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "UC-8100 System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.5",
"status": "affected",
"version": "3.0",
"versionType": "custom"
}
]
},
{
"product": "UC-8100-ME-T System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.1",
"status": "affected",
"version": "3.0",
"versionType": "custom"
}
]
},
{
"product": "UC-8200 System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.5",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "AIG-300 System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.4",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "UC-8410A with Debian 9 System Image",
"vendor": "Moxa",
"versions": [
{
"status": "affected",
"version": "4.0.2 and 4.1.2"
}
]
},
{
"product": "UC-8580 with Debian 9 System Image",
"vendor": "Moxa",
"versions": [
{
"status": "affected",
"version": "2.0 and 2.1"
}
]
},
{
"product": "UC-8540 with Debian 9 System Image",
"vendor": "Moxa",
"versions": [
{
"status": "affected",
"version": "2.0 and 2.1"
}
]
},
{
"product": "DA-662C-16-LX (GLB) System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.1.2",
"status": "affected",
"version": "1.0.2",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "En Garde ICSRange research team reported this vulnerability to CISA. "
}
],
"datePublic": "2022-11-22T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12,\u0026nbsp;UC-3100 System Image: Versions v1.0 to v1.6,\u0026nbsp;UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa\u0027s ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "CWE-250 Execution with Unnecessary Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-07T00:00:00.000Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05"
}
],
"solutions": [
{
"lang": "en",
"value": "Moxa developed updates to address this vulnerability. Users should follow the instructions in Moxa\u0027s security advisory to update their system image. "
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2022-3088",
"datePublished": "2022-11-22T00:00:00.000Z",
"dateReserved": "2022-09-01T00:00:00.000Z",
"dateUpdated": "2025-04-16T17:42:25.272Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-1257 (GCVE-0-2023-1257)
Vulnerability from nvd – Published: 2023-03-07 16:54 – Updated: 2025-01-16 21:55
VLAI?
Title
CVE-2023-1257
Summary
An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system.
Severity ?
7.6 (High)
CWE
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| MOXA | UC-8580 Series |
Affected:
V1.1
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:40:59.879Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-1257",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-16T20:31:37.359721Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-16T21:55:20.265Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "UC-8580 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.1"
}
]
},
{
"product": "UC-8540 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.0 to V1.2"
}
]
},
{
"product": "UC-8410A Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V2.2"
}
]
},
{
"product": "UC-8200 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.0 to V2.4"
}
]
},
{
"product": "UC-8100A-ME-T Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.0 to V1.1"
}
]
},
{
"product": "UC-8100 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.2"
}
]
},
{
"product": "UC-5100 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.2"
}
]
},
{
"product": "UC-3100 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.2 to V2.0"
}
]
},
{
"product": "UC-2100 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.3 to V1.5"
}
]
},
{
"product": "UC-2100-W Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.3 to V1.5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device\u2019s authentication files to create a new user and gain full access to the system."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-1263",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-03-07T16:54:21.053Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "CVE-2023-1257",
"x_generator": {
"engine": "VINCE 2.0.6",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2023-1257"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2023-1257",
"datePublished": "2023-03-07T16:54:21.053Z",
"dateReserved": "2023-03-07T16:16:20.728Z",
"dateUpdated": "2025-01-16T21:55:20.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-3086 (GCVE-0-2022-3086)
Vulnerability from nvd – Published: 2022-11-29 00:00 – Updated: 2025-04-16 17:42
VLAI?
Title
Cradlepoint IBR600 Command Injection
Summary
Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable
to shell escape, which enables local attackers with non-superuser
credentials to gain full, unrestrictive shell access which may allow an
attacker to execute arbitrary code.
Severity ?
7.1 (High)
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cradlepoint | IBR600 |
Affected:
0 , ≤ 6.5.0.160bc2e
(custom)
|
Credits
Uri Katz of Claroty Research reported these vulnerabilities to CISA.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:00:10.222Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-02"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-3086",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-16T17:25:49.176863Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-16T17:42:11.399Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"NetCloud OS (NCOS)"
],
"product": "IBR600 ",
"vendor": "Cradlepoint",
"versions": [
{
"lessThanOrEqual": "6.5.0.160bc2e",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Uri Katz of Claroty Research reported these vulnerabilities to CISA."
}
],
"datePublic": "2022-11-17T23:32:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\nCradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable \nto shell escape, which enables local attackers with non-superuser \ncredentials to gain full, unrestrictive shell access which may allow an \nattacker to execute arbitrary code.\n\n"
}
],
"value": "Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable \nto shell escape, which enables local attackers with non-superuser \ncredentials to gain full, unrestrictive shell access which may allow an \nattacker to execute arbitrary code.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-07T23:34:24.434Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-02"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\u003cp\u003eCradlepoint recommends users to update to at least version: \u003c/p\u003e\n\n\u003cul\u003e\u003cli\u003eNCOS v7.22.70\u003c/li\u003e\n\u003c/ul\u003e\u003cp\u003eNCOS release 7.1.0 and greater are no longer available for \nmanual or offline download and are performed via the NetCloud Manager, \nwhich requires a subscription. For more information and NCOS upgrade \nbest practices visit \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://cradlepoint.com/products/netcloud-service/\"\u003eCradlepoint Netcloud Service\u003c/a\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e.\u003c/span\u003e\u003c/p\u003e\n\n\u003cp\u003eFor more information about the latest update, see the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://d2c9o94y5j661e.cloudfront.net/FW-ReleaseNotesNCOS7.22.70-050722.pdf\"\u003eCradlepoint Release Notes\u003c/a\u003e\u003cspan style=\"background-color: var(--wht);\"\u003e.\u003c/span\u003e\u003c/p\u003e"
}
],
"value": "Cradlepoint recommends users to update to at least version: \n\n\n\n * NCOS v7.22.70\n\n\n\nNCOS release 7.1.0 and greater are no longer available for \nmanual or offline download and are performed via the NetCloud Manager, \nwhich requires a subscription. For more information and NCOS upgrade \nbest practices visit Cradlepoint Netcloud Service https://cradlepoint.com/products/netcloud-service/ .\n\n\n\nFor more information about the latest update, see the Cradlepoint Release Notes https://d2c9o94y5j661e.cloudfront.net/FW-ReleaseNotesNCOS7.22.70-050722.pdf .\n\n"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Cradlepoint IBR600 Command Injection",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2022-3086",
"datePublished": "2022-11-29T00:00:00.000Z",
"dateReserved": "2022-09-01T00:00:00.000Z",
"dateUpdated": "2025-04-16T17:42:11.399Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-3088 (GCVE-0-2022-3088)
Vulnerability from nvd – Published: 2022-11-22 00:00 – Updated: 2025-04-16 17:42
VLAI?
Summary
UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12, UC-3100 System Image: Versions v1.0 to v1.6, UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa's ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges.
Severity ?
7.8 (High)
CWE
- CWE-250 - Execution with Unnecessary Privileges
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Moxa | UC-8100A-ME-T System Imaage |
Affected:
1.0 , ≤ 1.6
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
En Garde ICSRange research team reported this vulnerability to CISA.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:00:10.008Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-3088",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-16T17:25:51.797778Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-16T17:42:25.272Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "UC-8100A-ME-T System Imaage",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "UC-2100 System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.12",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "UC-2100-W System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.12",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "UC-3100 System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.6",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "UC-5100 System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.4",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "UC-8100 System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.5",
"status": "affected",
"version": "3.0",
"versionType": "custom"
}
]
},
{
"product": "UC-8100-ME-T System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.1",
"status": "affected",
"version": "3.0",
"versionType": "custom"
}
]
},
{
"product": "UC-8200 System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.5",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "AIG-300 System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.4",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"product": "UC-8410A with Debian 9 System Image",
"vendor": "Moxa",
"versions": [
{
"status": "affected",
"version": "4.0.2 and 4.1.2"
}
]
},
{
"product": "UC-8580 with Debian 9 System Image",
"vendor": "Moxa",
"versions": [
{
"status": "affected",
"version": "2.0 and 2.1"
}
]
},
{
"product": "UC-8540 with Debian 9 System Image",
"vendor": "Moxa",
"versions": [
{
"status": "affected",
"version": "2.0 and 2.1"
}
]
},
{
"product": "DA-662C-16-LX (GLB) System Image",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "1.1.2",
"status": "affected",
"version": "1.0.2",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "En Garde ICSRange research team reported this vulnerability to CISA. "
}
],
"datePublic": "2022-11-22T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12,\u0026nbsp;UC-3100 System Image: Versions v1.0 to v1.6,\u0026nbsp;UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa\u0027s ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "CWE-250 Execution with Unnecessary Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-07T00:00:00.000Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-05"
}
],
"solutions": [
{
"lang": "en",
"value": "Moxa developed updates to address this vulnerability. Users should follow the instructions in Moxa\u0027s security advisory to update their system image. "
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2022-3088",
"datePublished": "2022-11-22T00:00:00.000Z",
"dateReserved": "2022-09-01T00:00:00.000Z",
"dateUpdated": "2025-04-16T17:42:25.272Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}