VAR-201603-0046

Vulnerability from variot - Updated: 2023-12-18 12:57

Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly encrypt credentials, which makes it easier for remote attackers to obtain the associated cleartext via unspecified vectors. Moxa's ioLogik E2200 and ioAdmin Configuration Utility are products of Moxa. The former is an Ethernet RTU (Remote Terminal Control System) controller, which is a set of software for managing and configuring the ioLogik E2200. A security vulnerability exists in Moxa's ioLogik E2200 version prior to 3.12 and in versions prior to ioAdmin Configuration Utility 3.18. The vulnerability stems from the program failing to encrypt the certificate. A remote attacker can exploit this vulnerability to obtain relevant plaintext data. Moxa ioLogik E2210 is a smart Ethernet I / O product from Moxa. There is a security vulnerability in Moxa ioLogik E2210. Attackers can use this vulnerability to obtain sensitive information and unauthorized access rights, implement replay attacks, and perform unauthorized operations. This may aid in further attacks

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201603-0046",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "iologik",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "3.11"
      },
      {
        "model": "ioadmin",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "3.17"
      },
      {
        "model": "ioadmin",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "moxa",
        "version": "3.18"
      },
      {
        "model": "iologik e2210",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2210-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2212",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2212-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2214",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2214-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2240",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2240-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2242",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2242-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2260",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2260-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2262",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik e2262-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iologik",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "moxa",
        "version": "3.12"
      },
      {
        "model": "iologik e2200",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "3.12"
      },
      {
        "model": "ioadmin configuration utility",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "3.18"
      },
      {
        "model": "iologik",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "3.11"
      },
      {
        "model": "ioadmin",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "3.17"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "ioadmin",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "iologik",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "5f0a9b4e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01474"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001695"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2282"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-030"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:moxa:ioadmin_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:moxa:iologik_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.11",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2210:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2260-t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2240-t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2240:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2212:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2214-t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2212-t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2210-t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2262:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2260:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2262-t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2242-t:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2242:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:iologik_e2214:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-2282"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Aditya K. Sood",
    "sources": [
      {
        "db": "BID",
        "id": "76330"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-383"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2016-2282",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": true,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2016-2282",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-01474",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "5f0a9b4e-2351-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-91101",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 3.9,
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2016-2282",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-01474",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201603-030",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "5f0a9b4e-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-91101",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "5f0a9b4e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01474"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91101"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001695"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2282"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-030"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly encrypt credentials, which makes it easier for remote attackers to obtain the associated cleartext via unspecified vectors. Moxa\u0027s ioLogik E2200 and ioAdmin Configuration Utility are products of Moxa. The former is an Ethernet RTU (Remote Terminal Control System) controller, which is a set of software for managing and configuring the ioLogik E2200. A security vulnerability exists in Moxa\u0027s ioLogik E2200 version prior to 3.12 and in versions prior to ioAdmin Configuration Utility 3.18. The vulnerability stems from the program failing to encrypt the certificate. A remote attacker can exploit this vulnerability to obtain relevant plaintext data. Moxa ioLogik E2210 is a smart Ethernet I / O product from Moxa. \nThere is a security vulnerability in Moxa ioLogik E2210. Attackers can use this vulnerability to obtain sensitive information and unauthorized access rights, implement replay attacks, and perform unauthorized operations. This may aid in further attacks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-2282"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001695"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01474"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-383"
      },
      {
        "db": "BID",
        "id": "76330"
      },
      {
        "db": "IVD",
        "id": "5f0a9b4e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91101"
      }
    ],
    "trust": 3.24
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-2282",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-063-01",
        "trust": 3.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-030",
        "trust": 0.9
      },
      {
        "db": "BID",
        "id": "76330",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01474",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001695",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-383",
        "trust": 0.6
      },
      {
        "db": "ICS CERT ALERT",
        "id": "ICS-ALERT-15-224-04",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "5F0A9B4E-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-91101",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "5f0a9b4e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01474"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91101"
      },
      {
        "db": "BID",
        "id": "76330"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001695"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2282"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-383"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-030"
      }
    ]
  },
  "id": "VAR-201603-0046",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "5f0a9b4e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01474"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91101"
      }
    ],
    "trust": 1.73333335
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "5f0a9b4e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01474"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:57:39.737000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
        "trust": 0.8,
        "url": "http://japan.moxa.com/"
      },
      {
        "title": "Moxa ioLogik E2200 and ioAdmin Configuration Utility information disclosure vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/72311"
      },
      {
        "title": "Moxa ioLogik E2200  and ioAdmin Configuration Utility Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60391"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-01474"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001695"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-030"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-91101"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001695"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2282"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-063-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2282"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2282"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/76330"
      },
      {
        "trust": 0.3,
        "url": "https://ics-cert.us-cert.gov/alerts/ics-alert-15-224-04"
      },
      {
        "trust": 0.3,
        "url": "http://store.moxa.com/a/product/iologik-e2210-series?id=m20090324001"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-01474"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91101"
      },
      {
        "db": "BID",
        "id": "76330"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001695"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2282"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-383"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-030"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "5f0a9b4e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01474"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91101"
      },
      {
        "db": "BID",
        "id": "76330"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001695"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2282"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-383"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-030"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-03-08T00:00:00",
        "db": "IVD",
        "id": "5f0a9b4e-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2016-03-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-01474"
      },
      {
        "date": "2016-03-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-91101"
      },
      {
        "date": "2015-08-12T00:00:00",
        "db": "BID",
        "id": "76330"
      },
      {
        "date": "2016-03-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-001695"
      },
      {
        "date": "2016-03-04T15:59:02.407000",
        "db": "NVD",
        "id": "CVE-2016-2282"
      },
      {
        "date": "2015-08-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201508-383"
      },
      {
        "date": "2016-03-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201603-030"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-03-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-01474"
      },
      {
        "date": "2016-03-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-91101"
      },
      {
        "date": "2016-07-06T13:34:00",
        "db": "BID",
        "id": "76330"
      },
      {
        "date": "2016-03-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-001695"
      },
      {
        "date": "2021-05-19T13:45:26.197000",
        "db": "NVD",
        "id": "CVE-2016-2282"
      },
      {
        "date": "2015-08-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201508-383"
      },
      {
        "date": "2021-05-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201603-030"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-030"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Moxa ioLogik E2200 Device and  ioAdmin Configuration Utility Vulnerabilities in which related plaintext is obtained",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001695"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-030"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…