VDE-2022-008
Vulnerability from csaf_weidmuellerinterfacegmbhcokg - Published: 2022-04-07 06:00 - Updated: 2022-04-07 06:00An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A high rate of transit traffic may cause a low-memory condition and a denial of service.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. The application's configuration file contains parameters that represent passwords in cleartext.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. Insufficient password requirements for the MGate web application may allow an attacker to gain access by brute-forcing account passwords.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. Sensitive information is sent to the web server in cleartext, which may allow an attacker to discover the credentials if they are able to observe traffic between the web browser and the server.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An attacker can access sensitive information (e.g., conduct username disclosure attacks) on the built-in WEB-service without authorization.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An attacker may be able to intercept weakly encrypted passwords and gain administrative access.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A predictable mechanism of generating tokens allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An Integer overflow in the built-in web server allows remote attackers to initiate DoS.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A Buffer overflow in the built-in web server allows remote attackers to initiate DoS, and probably to execute arbitrary code (issue 1 of 2).
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "Multiple issues have been found in the affected products. See CVE descriptions for details.",
"title": "Summary"
},
{
"category": "description",
"text": "These vulnerabilities may allow an attacker to DoS affected devices or access sensitive information or gain administrative access. See vulnerability descriptions for details.",
"title": "Impact"
},
{
"category": "description",
"text": "For all potential vulnerabilities, customers can download a patched firmware to secure their Modbus TCP/RTU Gateways properly. \nPlease download and install the latest firmware for your device by following the procedure below:\n\n1. Go to [www.weidmueller.com](https://www.weidmueller.com) (external link).\n2. Enter the product number of the Modbus TCP/RTU Gateway you want to update into the search field and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"SHOW DOWNLOADS\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nFind below the appropriate patched firmware versions for all affected products:\n\n| Product number | Product name | Patched firmware version |\n|----------------|-------------------------------|------------------------------|\n| 1504460000 | IE-GW-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |\n| 1504470000 | IE-GWT-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@weidmueller.com",
"name": "Weidmueller Interface GmbH \u0026 Co. KG",
"namespace": "https://www.weidmueller.com"
},
"references": [
{
"category": "self",
"summary": "VDE-2022-008: WEIDMUELLER: Multiple vulnerabilities in Modbus TCP/RTU Gateways - HTML",
"url": "https://certvde.com/en/advisories/VDE-2022-008/"
},
{
"category": "self",
"summary": "VDE-2022-008: WEIDMUELLER: Multiple vulnerabilities in Modbus TCP/RTU Gateways - CSAF",
"url": "https://weidmueller.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-008.json"
},
{
"category": "external",
"summary": "Vendor PSIRT",
"url": "https://www.weidmueller.com"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for Weidmueller Interface GmbH \u0026 Co. KG",
"url": "https://certvde.com/en/advisories/vendor/weidmueller/"
}
],
"title": "WEIDMUELLER: Multiple vulnerabilities in Modbus TCP/RTU Gateways",
"tracking": {
"aliases": [
"VDE-2022-008"
],
"current_release_date": "2022-04-07T06:00:00.000Z",
"generator": {
"date": "2025-04-28T09:53:04.765Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.24"
}
},
"id": "VDE-2022-008",
"initial_release_date": "2022-04-07T06:00:00.000Z",
"revision_history": [
{
"date": "2022-04-07T06:00:00.000Z",
"number": "1",
"summary": "Initial revision."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IE-GW-MB-2TX-1RS232/485",
"product": {
"name": "IE-GW-MB-2TX-1RS232/485",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"model_numbers": [
"1504460000"
]
}
}
},
{
"category": "product_name",
"name": "IE-GWT-MB-2TX-1RS232/485",
"product": {
"name": "IE-GWT-MB-2TX-1RS232/485",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"1504470000"
]
}
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version",
"name": "V1.0 (Build 14050818)",
"product": {
"name": "Firmware V1.0 (Build 14050818)",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version",
"name": "V2.1 (Build 21072817)",
"product": {
"name": "Firmware V2.1 (Build 21072817)",
"product_id": "CSAFPID-22001"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "WEIDMUELLER"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002"
],
"summary": "Affected products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"summary": "Fixed products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.0 (Build 14050818) installed on IE-GW-MB-2TX-1RS232/485",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.0 (Build 14050818) installed on IE-GWT-MB-2TX-1RS232/485",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V2.1 (Build 21072817) installed on IE-GW-MB-2TX-1RS232/485",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V2.1 (Build 21072817) installed on IE-GWT-MB-2TX-1RS232/485",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11002"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-9097",
"notes": [
{
"category": "description",
"text": "An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A high rate of transit traffic may cause a low-memory condition and a denial of service.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Modbus TCP/RTU Gateways properly. \nPlease download and install the latest firmware for your device by following the procedure below:\n\n1. Go to [www.weidmueller.com](https://www.weidmueller.com) (external link).\n2. Enter the product number of the Modbus TCP/RTU Gateway you want to update into the search field and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"SHOW DOWNLOADS\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nFind below the appropriate patched firmware versions for all affected products:\n\n| Product number | Product name | Patched firmware version |\n|----------------|-------------------------------|------------------------------|\n| 1504460000 | IE-GW-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |\n| 1504470000 | IE-GWT-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2019-9097"
},
{
"cve": "CVE-2019-9104",
"cwe": {
"id": "CWE-312",
"name": "Cleartext Storage of Sensitive Information"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. The application\u0027s configuration file contains parameters that represent passwords in cleartext.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Modbus TCP/RTU Gateways properly. \nPlease download and install the latest firmware for your device by following the procedure below:\n\n1. Go to [www.weidmueller.com](https://www.weidmueller.com) (external link).\n2. Enter the product number of the Modbus TCP/RTU Gateway you want to update into the search field and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"SHOW DOWNLOADS\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nFind below the appropriate patched firmware versions for all affected products:\n\n| Product number | Product name | Patched firmware version |\n|----------------|-------------------------------|------------------------------|\n| 1504460000 | IE-GW-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |\n| 1504470000 | IE-GWT-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2019-9104"
},
{
"cve": "CVE-2019-9096",
"cwe": {
"id": "CWE-521",
"name": "Weak Password Requirements"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. Insufficient password requirements for the MGate web application may allow an attacker to gain access by brute-forcing account passwords.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Modbus TCP/RTU Gateways properly. \nPlease download and install the latest firmware for your device by following the procedure below:\n\n1. Go to [www.weidmueller.com](https://www.weidmueller.com) (external link).\n2. Enter the product number of the Modbus TCP/RTU Gateway you want to update into the search field and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"SHOW DOWNLOADS\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nFind below the appropriate patched firmware versions for all affected products:\n\n| Product number | Product name | Patched firmware version |\n|----------------|-------------------------------|------------------------------|\n| 1504460000 | IE-GW-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |\n| 1504470000 | IE-GWT-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2019-9096"
},
{
"cve": "CVE-2019-9101",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. Sensitive information is sent to the web server in cleartext, which may allow an attacker to discover the credentials if they are able to observe traffic between the web browser and the server.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Modbus TCP/RTU Gateways properly. \nPlease download and install the latest firmware for your device by following the procedure below:\n\n1. Go to [www.weidmueller.com](https://www.weidmueller.com) (external link).\n2. Enter the product number of the Modbus TCP/RTU Gateway you want to update into the search field and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"SHOW DOWNLOADS\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nFind below the appropriate patched firmware versions for all affected products:\n\n| Product number | Product name | Patched firmware version |\n|----------------|-------------------------------|------------------------------|\n| 1504460000 | IE-GW-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |\n| 1504470000 | IE-GWT-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2019-9101"
},
{
"cve": "CVE-2019-9103",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An attacker can access sensitive information (e.g., conduct username disclosure attacks) on the built-in WEB-service without authorization.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Modbus TCP/RTU Gateways properly. \nPlease download and install the latest firmware for your device by following the procedure below:\n\n1. Go to [www.weidmueller.com](https://www.weidmueller.com) (external link).\n2. Enter the product number of the Modbus TCP/RTU Gateway you want to update into the search field and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"SHOW DOWNLOADS\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nFind below the appropriate patched firmware versions for all affected products:\n\n| Product number | Product name | Patched firmware version |\n|----------------|-------------------------------|------------------------------|\n| 1504460000 | IE-GW-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |\n| 1504470000 | IE-GWT-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2019-9103"
},
{
"cve": "CVE-2019-9095",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An attacker may be able to intercept weakly encrypted passwords and gain administrative access.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Modbus TCP/RTU Gateways properly. \nPlease download and install the latest firmware for your device by following the procedure below:\n\n1. Go to [www.weidmueller.com](https://www.weidmueller.com) (external link).\n2. Enter the product number of the Modbus TCP/RTU Gateway you want to update into the search field and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"SHOW DOWNLOADS\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nFind below the appropriate patched firmware versions for all affected products:\n\n| Product number | Product name | Patched firmware version |\n|----------------|-------------------------------|------------------------------|\n| 1504460000 | IE-GW-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |\n| 1504470000 | IE-GWT-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2019-9095"
},
{
"cve": "CVE-2019-9102",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A predictable mechanism of generating tokens allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Modbus TCP/RTU Gateways properly. \nPlease download and install the latest firmware for your device by following the procedure below:\n\n1. Go to [www.weidmueller.com](https://www.weidmueller.com) (external link).\n2. Enter the product number of the Modbus TCP/RTU Gateway you want to update into the search field and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"SHOW DOWNLOADS\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nFind below the appropriate patched firmware versions for all affected products:\n\n| Product number | Product name | Patched firmware version |\n|----------------|-------------------------------|------------------------------|\n| 1504460000 | IE-GW-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |\n| 1504470000 | IE-GWT-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2019-9102"
},
{
"cve": "CVE-2019-9098",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An Integer overflow in the built-in web server allows remote attackers to initiate DoS.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Modbus TCP/RTU Gateways properly. \nPlease download and install the latest firmware for your device by following the procedure below:\n\n1. Go to [www.weidmueller.com](https://www.weidmueller.com) (external link).\n2. Enter the product number of the Modbus TCP/RTU Gateway you want to update into the search field and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"SHOW DOWNLOADS\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nFind below the appropriate patched firmware versions for all affected products:\n\n| Product number | Product name | Patched firmware version |\n|----------------|-------------------------------|------------------------------|\n| 1504460000 | IE-GW-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |\n| 1504470000 | IE-GWT-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2019-9098"
},
{
"cve": "CVE-2019-9099",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "description",
"text": "An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A Buffer overflow in the built-in web server allows remote attackers to initiate DoS, and probably to execute arbitrary code (issue 1 of 2).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Modbus TCP/RTU Gateways properly. \nPlease download and install the latest firmware for your device by following the procedure below:\n\n1. Go to [www.weidmueller.com](https://www.weidmueller.com) (external link).\n2. Enter the product number of the Modbus TCP/RTU Gateway you want to update into the search field and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"SHOW DOWNLOADS\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nFind below the appropriate patched firmware versions for all affected products:\n\n| Product number | Product name | Patched firmware version |\n|----------------|-------------------------------|------------------------------|\n| 1504460000 | IE-GW-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |\n| 1504470000 | IE-GWT-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002"
]
}
],
"title": "CVE-2019-9099"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.