{"id": "CVE-2023-5962", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 2.8}, {"type": "Secondary", "source": "psirt@moxa.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 2.8}]}, "published": "2023-12-23T09:15:08.050", "references": [{"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-235250-iologik-e1200-series-web-server-vulnerability", "tags": ["Vendor Advisory"], "source": "psirt@moxa.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-327"}]}, {"type": "Secondary", "source": "psirt@moxa.com", "description": [{"lang": "en", "value": "CWE-327"}]}], "descriptions": [{"lang": "en", "value": "A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization.\n\n"}, {"lang": "es", "value": "Se ha identificado una vulnerabilidad de algoritmo criptogr\u00e1fico d\u00e9bil en las versiones de firmware de la serie ioLogik E1200 v3.3 y anteriores. Esta vulnerabilidad puede ayudar a un atacante a comprometer la confidencialidad de datos confidenciales. Esta vulnerabilidad puede llevar a un atacante a obtener una autorizaci\u00f3n inesperada."}], "lastModified": "2024-01-03T20:04:06.947", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1210_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF14969B-6E9F-4553-96EB-7BE6C5834260", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1210:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "67DDCD42-10D5-46B2-AB91-66EF30D5D645"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1211_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D03FA4E2-4A30-4ED9-BA4D-5546FC0BA939", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1211:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "308E46FB-488A-4907-9A69-AACDE23A3394"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1212_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA133D93-4A1D-419A-92C5-C0C0A35187B5", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1212:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "616E5D0B-0D3A-4808-8C15-2FDC35E8605C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1213_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E39755B-9625-4D95-B425-BD28B60180CA", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1213:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9AAE4F4E-779C-401F-A75E-AC66757DD313"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1214_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F59B517D-63C4-4FE5-A89F-B2A235E8239A", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1214:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A0837606-60F7-4563-8F80-AE7C1CC3F469"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1240_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90601A69-F749-4E68-A034-74B9F046436F", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1240:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "77A9D90D-0419-410C-AF65-0FFE0FF2882F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1241_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38280BA6-C262-45AC-AD33-813523F64DAB", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1241:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3239D045-8A7C-4407-B77C-E82C178D8B90"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1242_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB237801-4287-4A30-8CE8-DB90FAB5C118", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1242:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5D40DF4C-0EA9-44B0-8D8C-D1FC2AB5A357"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1260_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACDAE3E7-675E-44BF-BD57-BF5C31B969A5", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1260:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B0B4FA04-BF84-4B8A-A295-0312A3790F2E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1262_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "485CCB1F-A642-48B2-A8AD-4A7EBB5791BD", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1262:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3366C39B-50FD-497B-A6A1-875CEB8913C5"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "psirt@moxa.com"}