VAR-201706-0364
Vulnerability from variot - Updated: 2023-12-18 12:43A Hard-Coded Passwords issue was discovered in Marel Food Processing Systems M3000 terminal associated with the following systems: A320, A325, A371, A520 Master, A520 Slave, A530, A542, A571, Check Bin Grader, FlowlineQC T376, IPM3 Dual Cam v132, IPM3 Dual Cam v139, IPM3 Single Cam v132, P520, P574, SensorX13 QC flow line, SensorX23 QC Master, SensorX23 QC Slave, Speed Batcher, T374, T377, V36, V36B, and V36C; M3210 terminal associated with the same systems as the M3000 terminal identified above; M3000 desktop software associated with the same systems as the M3000 terminal identified above; MAC4 controller associated with the same systems as the M3000 terminal identified above; SensorX23 X-ray machine; SensorX25 X-ray machine; and MWS2 weighing system. The end user does not have the ability to change system passwords. plural Marel Food Processing System The product firmware contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MarelSensorX25X-rayMachine and others are products of the medical industry of Iceland Marel that provide various medical tests. A security bypass vulnerability exists in several Marel products that originated from the use of hard-coded certificates by programs. A remote attacker could exploit the vulnerability to gain unauthorized access to the affected device. Marel Food Processing Systems are prone to following security vulnerabilities: 1. A security-bypass vulnerability. 2. An arbitrary file-upload vulnerability. Marel SensorX25 X-ray Machine, etc
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201706-0364",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "a542",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "check bin grader",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a530",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a325",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a520 master",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "flowlineqc t376",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a520 slave",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a571",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a371",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "a320",
"scope": "eq",
"trust": 1.6,
"vendor": "marel",
"version": null
},
{
"model": "ipm3 dual cam",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": "139"
},
{
"model": "ipm3 dual cam",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": "132"
},
{
"model": "p520",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "sensorx13 qc flow line",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "sensorx23 qc slave",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "t374",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "t377",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "sensorx23 qc master",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "v36c",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "v36",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "v36b",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "p574",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "speed batcher",
"scope": "eq",
"trust": 1.0,
"vendor": "marel",
"version": null
},
{
"model": "a320",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a325",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a371",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a520 master",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a520 slave",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a530",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a542",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "a571",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "check bin grader",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "flowlineqc t376",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "ipm3 dual cam",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "ipm3 single cam",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "p520",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "p574",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "sensorx13 qc flow line",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "sensorx23 qc master",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "sensorx23 qc slave",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "speed batcher",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "t374",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "t377",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "v36",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "v36b",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "v36c",
"scope": null,
"trust": 0.8,
"vendor": "marel",
"version": null
},
{
"model": "sensorx25 x-ray machine",
"scope": null,
"trust": 0.6,
"vendor": "marel",
"version": null
},
{
"model": "sensorx23 x-ray machine",
"scope": null,
"trust": 0.6,
"vendor": "marel",
"version": null
},
{
"model": "mws2 weighing system",
"scope": null,
"trust": 0.6,
"vendor": "marel",
"version": null
},
{
"model": "mac4 controller",
"scope": null,
"trust": 0.6,
"vendor": "marel",
"version": null
},
{
"model": "m3210 termina",
"scope": null,
"trust": 0.6,
"vendor": "marel",
"version": null
},
{
"model": "m3000 termina",
"scope": null,
"trust": 0.6,
"vendor": "marel",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ipm3 dual cam",
"version": "132"
},
{
"model": "sensorx25 x-ray machine",
"scope": "eq",
"trust": 0.3,
"vendor": "marel",
"version": "0"
},
{
"model": "sensorx23 x-ray machine",
"scope": "eq",
"trust": 0.3,
"vendor": "marel",
"version": "0"
},
{
"model": "mws2 weighing system",
"scope": "eq",
"trust": 0.3,
"vendor": "marel",
"version": "0"
},
{
"model": "mac4 controller",
"scope": "eq",
"trust": 0.3,
"vendor": "marel",
"version": "0"
},
{
"model": "m3210 terminal",
"scope": "eq",
"trust": 0.3,
"vendor": "marel",
"version": "0"
},
{
"model": "m3000 terminal",
"scope": "eq",
"trust": 0.3,
"vendor": "marel",
"version": "0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a320",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "flowlineqc t376",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "ipm3 dual cam",
"version": "139"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "p520",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "p574",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "sensorx13 qc flow line",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "sensorx23 qc master",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "sensorx23 qc slave",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "speed batcher",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a325",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "t374",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "t377",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "v36",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "v36b",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "v36c",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a371",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a520 master",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a520 slave",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a530",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a542",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "a571",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "check bin grader",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "b9677194-118b-4e66-8512-f5dc8b758b86"
},
{
"db": "CNVD",
"id": "CNVD-2017-05478"
},
{
"db": "BID",
"id": "97388"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008743"
},
{
"db": "NVD",
"id": "CVE-2016-9358"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-557"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a320_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a320:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a325_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a325:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a371_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a371:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a520_master_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a520_master:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a520_slave_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a520_slave:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a530_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a530:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a542_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a542:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:a571_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:a571:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:check_bin_grader_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:check_bin_grader:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:flowlineqc_t376_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:flowlineqc_t376:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:ipm3_dual_cam_firmware:132:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:ipm3_dual_cam:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:ipm3_dual_cam_firmware:139:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:ipm3_dual_cam:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:ipm3_dual_cam_firmware:132:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:ipm3_dual_cam:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:p520_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:p520:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:p574_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:p574:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:sensorx13_qc_flow_line_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:sensorx13_qc_flow_line:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:sensorx23_qc_master_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:sensorx23_qc_master:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:sensorx23_qc_slave_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:sensorx23_qc_slave:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:speed_batcher_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:speed_batcher:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:t374_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:t374:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:t377_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:t377:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:v36_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:v36:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:v36b_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:v36b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:marel:v36c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:marel:v36c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9358"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Daniel Lance",
"sources": [
{
"db": "BID",
"id": "97388"
}
],
"trust": 0.3
},
"cve": "CVE-2016-9358",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2016-9358",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-05478",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "b9677194-118b-4e66-8512-f5dc8b758b86",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-98178",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2016-9358",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-9358",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "CNVD",
"id": "CNVD-2017-05478",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-557",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "b9677194-118b-4e66-8512-f5dc8b758b86",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-98178",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2016-9358",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "b9677194-118b-4e66-8512-f5dc8b758b86"
},
{
"db": "CNVD",
"id": "CNVD-2017-05478"
},
{
"db": "VULHUB",
"id": "VHN-98178"
},
{
"db": "VULMON",
"id": "CVE-2016-9358"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008743"
},
{
"db": "NVD",
"id": "CVE-2016-9358"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-557"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A Hard-Coded Passwords issue was discovered in Marel Food Processing Systems M3000 terminal associated with the following systems: A320, A325, A371, A520 Master, A520 Slave, A530, A542, A571, Check Bin Grader, FlowlineQC T376, IPM3 Dual Cam v132, IPM3 Dual Cam v139, IPM3 Single Cam v132, P520, P574, SensorX13 QC flow line, SensorX23 QC Master, SensorX23 QC Slave, Speed Batcher, T374, T377, V36, V36B, and V36C; M3210 terminal associated with the same systems as the M3000 terminal identified above; M3000 desktop software associated with the same systems as the M3000 terminal identified above; MAC4 controller associated with the same systems as the M3000 terminal identified above; SensorX23 X-ray machine; SensorX25 X-ray machine; and MWS2 weighing system. The end user does not have the ability to change system passwords. plural Marel Food Processing System The product firmware contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MarelSensorX25X-rayMachine and others are products of the medical industry of Iceland Marel that provide various medical tests. A security bypass vulnerability exists in several Marel products that originated from the use of hard-coded certificates by programs. A remote attacker could exploit the vulnerability to gain unauthorized access to the affected device. Marel Food Processing Systems are prone to following security vulnerabilities:\n1. A security-bypass vulnerability. \n2. An arbitrary file-upload vulnerability. Marel SensorX25 X-ray Machine, etc",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-9358"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008743"
},
{
"db": "CNVD",
"id": "CNVD-2017-05478"
},
{
"db": "BID",
"id": "97388"
},
{
"db": "IVD",
"id": "b9677194-118b-4e66-8512-f5dc8b758b86"
},
{
"db": "VULHUB",
"id": "VHN-98178"
},
{
"db": "VULMON",
"id": "CVE-2016-9358"
}
],
"trust": 2.79
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-9358",
"trust": 3.7
},
{
"db": "BID",
"id": "97388",
"trust": 2.7
},
{
"db": "ICS CERT",
"id": "ICSA-17-094-02",
"trust": 2.7
},
{
"db": "ICS CERT",
"id": "ICSA-17-094-02B",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-05478",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201704-557",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008743",
"trust": 0.8
},
{
"db": "IVD",
"id": "B9677194-118B-4E66-8512-F5DC8B758B86",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-98178",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2016-9358",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "b9677194-118b-4e66-8512-f5dc8b758b86"
},
{
"db": "CNVD",
"id": "CNVD-2017-05478"
},
{
"db": "VULHUB",
"id": "VHN-98178"
},
{
"db": "VULMON",
"id": "CVE-2016-9358"
},
{
"db": "BID",
"id": "97388"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008743"
},
{
"db": "NVD",
"id": "CVE-2016-9358"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-557"
}
]
},
"id": "VAR-201706-0364",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "b9677194-118b-4e66-8512-f5dc8b758b86"
},
{
"db": "CNVD",
"id": "CNVD-2017-05478"
},
{
"db": "VULHUB",
"id": "VHN-98178"
}
],
"trust": 1.7888888666666667
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "b9677194-118b-4e66-8512-f5dc8b758b86"
},
{
"db": "CNVD",
"id": "CNVD-2017-05478"
}
]
},
"last_update_date": "2023-12-18T12:43:36.241000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://marel.com/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008743"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-798",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-98178"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008743"
},
{
"db": "NVD",
"id": "CVE-2016-9358"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-094-02"
},
{
"trust": 1.9,
"url": "http://www.securityfocus.com/bid/97388"
},
{
"trust": 0.9,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-094-02b"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9358"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-9358"
},
{
"trust": 0.3,
"url": "http://marel.com/"
},
{
"trust": 0.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-094-02 "
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/798.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-05478"
},
{
"db": "VULHUB",
"id": "VHN-98178"
},
{
"db": "VULMON",
"id": "CVE-2016-9358"
},
{
"db": "BID",
"id": "97388"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008743"
},
{
"db": "NVD",
"id": "CVE-2016-9358"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-557"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "b9677194-118b-4e66-8512-f5dc8b758b86"
},
{
"db": "CNVD",
"id": "CNVD-2017-05478"
},
{
"db": "VULHUB",
"id": "VHN-98178"
},
{
"db": "VULMON",
"id": "CVE-2016-9358"
},
{
"db": "BID",
"id": "97388"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-008743"
},
{
"db": "NVD",
"id": "CVE-2016-9358"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-557"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-27T00:00:00",
"db": "IVD",
"id": "b9677194-118b-4e66-8512-f5dc8b758b86"
},
{
"date": "2017-04-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05478"
},
{
"date": "2017-06-30T00:00:00",
"db": "VULHUB",
"id": "VHN-98178"
},
{
"date": "2017-06-30T00:00:00",
"db": "VULMON",
"id": "CVE-2016-9358"
},
{
"date": "2017-04-04T00:00:00",
"db": "BID",
"id": "97388"
},
{
"date": "2017-08-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008743"
},
{
"date": "2017-06-30T03:29:00.187000",
"db": "NVD",
"id": "CVE-2016-9358"
},
{
"date": "2017-04-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-557"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-05478"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-98178"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULMON",
"id": "CVE-2016-9358"
},
{
"date": "2017-04-11T00:02:00",
"db": "BID",
"id": "97388"
},
{
"date": "2017-08-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-008743"
},
{
"date": "2019-10-09T23:20:25.397000",
"db": "NVD",
"id": "CVE-2016-9358"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-557"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-557"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Marel Food Processing System Vulnerabilities related to the use of hard-coded credentials in product firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-008743"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-557"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.