Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
8 vulnerabilities found for PT-7528 Series by Moxa
CERTFR-2026-AVI-0458
Vulnerability from certfr_avis - Published: 2026-04-20 - Updated: 2026-04-20
Une vulnérabilité a été découverte dans les produits Moxa. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Moxa | PT-510 Series | PT-510 Series versions antérieures à v3.8.12 | ||
| Moxa | PT-G510 Series | PT-G510 Series versions antérieures à v6.5.22 | ||
| Moxa | PT-7828 Series | PT-7828 Series versions antérieures à v4.0.8 | ||
| Moxa | PT-G503 Series | PT-G503 Series versions antérieures à v5.3.12 | ||
| Moxa | PT-G7728 Series | PT-G7728 Series versions antérieures à v6.6 | ||
| Moxa | PT-G7828 Series | PT-G7828 Series versions antérieures à v6.6 | ||
| Moxa | PT-7528 Series | PT-7528 Series versions antérieures à v5.0.34 | ||
| Moxa | PT-7728 Series | PT-7728 Series versions antérieures à v3.9.6 | ||
| Moxa | PT-508 Series | PT-508 Series versions antérieures à v3.8.12 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "PT-510 Series versions ant\u00e9rieures \u00e0 v3.8.12",
"product": {
"name": "PT-510 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "PT-G510 Series versions ant\u00e9rieures \u00e0 v6.5.22",
"product": {
"name": "PT-G510 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "PT-7828 Series versions ant\u00e9rieures \u00e0 v4.0.8",
"product": {
"name": "PT-7828 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "PT-G503 Series versions ant\u00e9rieures \u00e0 v5.3.12",
"product": {
"name": "PT-G503 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "PT-G7728 Series versions ant\u00e9rieures \u00e0 v6.6",
"product": {
"name": "PT-G7728 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "PT-G7828 Series versions ant\u00e9rieures \u00e0 v6.6",
"product": {
"name": "PT-G7828 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "PT-7528 Series versions ant\u00e9rieures \u00e0 v5.0.34",
"product": {
"name": "PT-7528 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "PT-7728 Series versions ant\u00e9rieures \u00e0 v3.9.6",
"product": {
"name": "PT-7728 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "PT-508 Series versions ant\u00e9rieures \u00e0 v3.8.12",
"product": {
"name": "PT-508 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
}
],
"initial_release_date": "2026-04-20T00:00:00",
"last_revision_date": "2026-04-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0458",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Moxa. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Moxa",
"vendor_advisories": [
{
"published_at": "2026-04-20",
"title": "Bulletin de s\u00e9curit\u00e9 Moxa MPSA-258681",
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258681-cve-2020-11868-ntp-vulnerability-in-ethernet-switches"
}
]
}
CVE-2024-12297 (GCVE-0-2024-12297)
Vulnerability from nvd – Published: 2025-01-15 10:00 – Updated: 2025-03-06 08:27- CWE-656 - Reliance on Security Through Obscurity
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Moxa | EDS-508A Series |
Affected:
1.0 , ≤ 3.11
(custom)
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-12297",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-15T14:49:11.063174Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-15T14:49:22.117Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "EDS-508A Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.11",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-508 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.8",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-510 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.8",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-7528 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "5.0",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-7728 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.9",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-7828 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "4.0",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-G503 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "5.3",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-G510 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "6.5",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-G7728 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "6.5",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-G7828 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "6.5",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Artem Turyshev from Rosatom Automated Control Systems Joint-Stock Company"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Moxa\u2019s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.\u003cbr\u003e"
}
],
"value": "Moxa\u2019s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device."
}
],
"impacts": [
{
"capecId": "CAPEC-49",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-49: Password Brute Forcing"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 9.2,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-656",
"description": "CWE-656: Reliance on Security Through Obscurity",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-06T08:27:52.297Z",
"orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"shortName": "Moxa"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241407-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-in-eds-508a-series"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241408-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-identified-in-pt-switches"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMoxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below.\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003eEDS-508A Series: Please contact Moxa Technical Support for the security patch\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003ePT Series:\u0026nbsp;Please contact Moxa Technical Support for the security patch\u003cbr\u003e\u003cbr\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e"
}
],
"value": "Moxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below.\n\n * EDS-508A Series: Please contact Moxa Technical Support for the security patch\n\n\n * PT Series:\u00a0Please contact Moxa Technical Support for the security patch"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Frontend Authorization Logic Disclosure Vulnerability",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cul\u003e\u003cli\u003eMinimize network exposure to ensure the device is not accessible from the Internet.\u003c/li\u003e\u003cli\u003eLimit SSH access to trusted IP addresses and networks using firewall rules or TCP wrappers. \u003c/li\u003e\u003cli\u003eImplement IDS or Intrusion Prevention System (IPS) to detect and prevent exploitation attempts. These systems can provide an additional layer of defense by monitoring network traffic for signs of attacks. \u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e"
}
],
"value": "* Minimize network exposure to ensure the device is not accessible from the Internet.\n * Limit SSH access to trusted IP addresses and networks using firewall rules or TCP wrappers. \n * Implement IDS or Intrusion Prevention System (IPS) to detect and prevent exploitation attempts. These systems can provide an additional layer of defense by monitoring network traffic for signs of attacks."
}
],
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"assignerShortName": "Moxa",
"cveId": "CVE-2024-12297",
"datePublished": "2025-01-15T10:00:46.524Z",
"dateReserved": "2024-12-06T04:02:40.742Z",
"dateUpdated": "2025-03-06T08:27:52.297Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-12297 (GCVE-0-2024-12297)
Vulnerability from cvelistv5 – Published: 2025-01-15 10:00 – Updated: 2025-03-06 08:27- CWE-656 - Reliance on Security Through Obscurity
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Moxa | EDS-508A Series |
Affected:
1.0 , ≤ 3.11
(custom)
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-12297",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-15T14:49:11.063174Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-15T14:49:22.117Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "EDS-508A Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.11",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-508 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.8",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-510 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.8",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-7528 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "5.0",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-7728 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "3.9",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-7828 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "4.0",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-G503 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "5.3",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-G510 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "6.5",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-G7728 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "6.5",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PT-G7828 Series",
"vendor": "Moxa",
"versions": [
{
"lessThanOrEqual": "6.5",
"status": "affected",
"version": "1.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Artem Turyshev from Rosatom Automated Control Systems Joint-Stock Company"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Moxa\u2019s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.\u003cbr\u003e"
}
],
"value": "Moxa\u2019s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device."
}
],
"impacts": [
{
"capecId": "CAPEC-49",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-49: Password Brute Forcing"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 9.2,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-656",
"description": "CWE-656: Reliance on Security Through Obscurity",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-06T08:27:52.297Z",
"orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"shortName": "Moxa"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241407-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-in-eds-508a-series"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241408-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-identified-in-pt-switches"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMoxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below.\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003eEDS-508A Series: Please contact Moxa Technical Support for the security patch\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003ePT Series:\u0026nbsp;Please contact Moxa Technical Support for the security patch\u003cbr\u003e\u003cbr\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e"
}
],
"value": "Moxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below.\n\n * EDS-508A Series: Please contact Moxa Technical Support for the security patch\n\n\n * PT Series:\u00a0Please contact Moxa Technical Support for the security patch"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Frontend Authorization Logic Disclosure Vulnerability",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cul\u003e\u003cli\u003eMinimize network exposure to ensure the device is not accessible from the Internet.\u003c/li\u003e\u003cli\u003eLimit SSH access to trusted IP addresses and networks using firewall rules or TCP wrappers. \u003c/li\u003e\u003cli\u003eImplement IDS or Intrusion Prevention System (IPS) to detect and prevent exploitation attempts. These systems can provide an additional layer of defense by monitoring network traffic for signs of attacks. \u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e"
}
],
"value": "* Minimize network exposure to ensure the device is not accessible from the Internet.\n * Limit SSH access to trusted IP addresses and networks using firewall rules or TCP wrappers. \n * Implement IDS or Intrusion Prevention System (IPS) to detect and prevent exploitation attempts. These systems can provide an additional layer of defense by monitoring network traffic for signs of attacks."
}
],
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"assignerShortName": "Moxa",
"cveId": "CVE-2024-12297",
"datePublished": "2025-01-15T10:00:46.524Z",
"dateReserved": "2024-12-06T04:02:40.742Z",
"dateUpdated": "2025-03-06T08:27:52.297Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
VAR-202003-1666
Vulnerability from variot - Updated: 2024-11-23 21:36In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the application utilizes weak password requirements, which may allow an attacker to gain unauthorized access. Moxa PT-7528 and PT-7828 The series firmware contains a vulnerability related to the request for a weak password.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202003-1666",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "pt-7528-8mst-16tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-wv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-24-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-f-24-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8ssc-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8ssc-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828 series",
"scope": "lte",
"trust": 0.6,
"vendor": "moxa",
"version": "\u003c=3.9"
},
{
"model": "pt-7528 series",
"scope": "lte",
"trust": 0.6,
"vendor": "moxa",
"version": "\u003c=4.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8ssc 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8ssc 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp wv wv",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "0c731115-513e-49b7-8112-8834cb2de285"
},
{
"db": "CNVD",
"id": "CNVD-2020-13514"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003385"
},
{
"db": "NVD",
"id": "CVE-2020-6995"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-wv_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003385"
}
]
},
"cve": "CVE-2020-6995",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2020-6995",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-003385",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-13514",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "0c731115-513e-49b7-8112-8834cb2de285",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-6995",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-003385",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-6995",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "JVNDB-2020-003385",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2020-13514",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202002-1167",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "0c731115-513e-49b7-8112-8834cb2de285",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "0c731115-513e-49b7-8112-8834cb2de285"
},
{
"db": "CNVD",
"id": "CNVD-2020-13514"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003385"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1167"
},
{
"db": "NVD",
"id": "CVE-2020-6995"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the application utilizes weak password requirements, which may allow an attacker to gain unauthorized access. Moxa PT-7528 and PT-7828 The series firmware contains a vulnerability related to the request for a weak password.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-6995"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003385"
},
{
"db": "CNVD",
"id": "CNVD-2020-13514"
},
{
"db": "IVD",
"id": "0c731115-513e-49b7-8112-8834cb2de285"
}
],
"trust": 2.34
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-6995",
"trust": 3.2
},
{
"db": "ICS CERT",
"id": "ICSA-20-056-03",
"trust": 3.0
},
{
"db": "CNVD",
"id": "CNVD-2020-13514",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1167",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003385",
"trust": 0.8
},
{
"db": "NSFOCUS",
"id": "47427",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2020.0725",
"trust": 0.6
},
{
"db": "IVD",
"id": "0C731115-513E-49B7-8112-8834CB2DE285",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "0c731115-513e-49b7-8112-8834cb2de285"
},
{
"db": "CNVD",
"id": "CNVD-2020-13514"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003385"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1167"
},
{
"db": "NVD",
"id": "CVE-2020-6995"
}
]
},
"id": "VAR-202003-1666",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "0c731115-513e-49b7-8112-8834cb2de285"
},
{
"db": "CNVD",
"id": "CNVD-2020-13514"
}
],
"trust": 1.5375
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "0c731115-513e-49b7-8112-8834cb2de285"
},
{
"db": "CNVD",
"id": "CNVD-2020-13514"
}
]
},
"last_update_date": "2024-11-23T21:36:01.690000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.moxa.com/en/"
},
{
"title": "Patch for Moxa PT-7528 and PT-7828 Series Weak Password Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/204857"
},
{
"title": "Moxa PT-7528 and PT-7828 Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110366"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-13514"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003385"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1167"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-521",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003385"
},
{
"db": "NVD",
"id": "CVE-2020-6995"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.0,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-6995"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6995"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47427"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.0725/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-13514"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003385"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1167"
},
{
"db": "NVD",
"id": "CVE-2020-6995"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "0c731115-513e-49b7-8112-8834cb2de285"
},
{
"db": "CNVD",
"id": "CNVD-2020-13514"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003385"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1167"
},
{
"db": "NVD",
"id": "CVE-2020-6995"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-25T00:00:00",
"db": "IVD",
"id": "0c731115-513e-49b7-8112-8834cb2de285"
},
{
"date": "2020-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-13514"
},
{
"date": "2020-04-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-003385"
},
{
"date": "2020-02-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202002-1167"
},
{
"date": "2020-03-24T20:15:15.100000",
"db": "NVD",
"id": "CVE-2020-6995"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-13514"
},
{
"date": "2020-04-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-003385"
},
{
"date": "2020-08-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202002-1167"
},
{
"date": "2024-11-21T05:36:27.387000",
"db": "NVD",
"id": "CVE-2020-6995"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202002-1167"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Moxa PT-7528 and PT-7828 Vulnerability in requesting weak passwords in series firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003385"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "IVD",
"id": "0c731115-513e-49b7-8112-8834cb2de285"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1167"
}
],
"trust": 0.8
}
}
VAR-202003-1601
Vulnerability from variot - Updated: 2024-11-23 21:36In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a hard-coded cryptographic key, which increases the possibility that confidential data can be recovered. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202003-1601",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "pt-7528-8mst-16tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-wv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-24-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-f-24-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8ssc-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8ssc-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828 f-24",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 f-24-24",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 f-24-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 f-48",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 f-48-48",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 series",
"scope": "lte",
"trust": 0.6,
"vendor": "moxa",
"version": "\u003c=3.9"
},
{
"model": "pt-7528 series",
"scope": "lte",
"trust": 0.6,
"vendor": "moxa",
"version": "\u003c=4.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8ssc 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8ssc 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp wv wv",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "eba56277-eeb7-4731-9c4d-337185d89917"
},
{
"db": "CNVD",
"id": "CNVD-2020-13512"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003322"
},
{
"db": "NVD",
"id": "CVE-2020-6983"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-24_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-24-24_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-24-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-48_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-48-48_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003322"
}
]
},
"cve": "CVE-2020-6983",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2020-6983",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-003322",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-13512",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "eba56277-eeb7-4731-9c4d-337185d89917",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-6983",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-003322",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-6983",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "JVNDB-2020-003322",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2020-13512",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202002-1176",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "eba56277-eeb7-4731-9c4d-337185d89917",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "eba56277-eeb7-4731-9c4d-337185d89917"
},
{
"db": "CNVD",
"id": "CNVD-2020-13512"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003322"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1176"
},
{
"db": "NVD",
"id": "CVE-2020-6983"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a hard-coded cryptographic key, which increases the possibility that confidential data can be recovered. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-6983"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003322"
},
{
"db": "CNVD",
"id": "CNVD-2020-13512"
},
{
"db": "IVD",
"id": "eba56277-eeb7-4731-9c4d-337185d89917"
}
],
"trust": 2.34
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-6983",
"trust": 3.2
},
{
"db": "ICS CERT",
"id": "ICSA-20-056-03",
"trust": 3.0
},
{
"db": "CNVD",
"id": "CNVD-2020-13512",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1176",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003322",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2020.0725",
"trust": 0.6
},
{
"db": "IVD",
"id": "EBA56277-EEB7-4731-9C4D-337185D89917",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "eba56277-eeb7-4731-9c4d-337185d89917"
},
{
"db": "CNVD",
"id": "CNVD-2020-13512"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003322"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1176"
},
{
"db": "NVD",
"id": "CVE-2020-6983"
}
]
},
"id": "VAR-202003-1601",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "eba56277-eeb7-4731-9c4d-337185d89917"
},
{
"db": "CNVD",
"id": "CNVD-2020-13512"
}
],
"trust": 1.5375
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "eba56277-eeb7-4731-9c4d-337185d89917"
},
{
"db": "CNVD",
"id": "CNVD-2020-13512"
}
]
},
"last_update_date": "2024-11-23T21:36:01.593000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.moxa.com/en/"
},
{
"title": "Patch for Moxa PT-7528 and PT-7828 Series Hardcoded Vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/204853"
},
{
"title": "Moxa PT-7528 and PT-7828 Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110372"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-13512"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003322"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1176"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-798",
"trust": 1.8
},
{
"problemtype": "CWE-321",
"trust": 1.0
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003322"
},
{
"db": "NVD",
"id": "CVE-2020-6983"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.0,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-6983"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6983"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.0725/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-13512"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003322"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1176"
},
{
"db": "NVD",
"id": "CVE-2020-6983"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "eba56277-eeb7-4731-9c4d-337185d89917"
},
{
"db": "CNVD",
"id": "CNVD-2020-13512"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003322"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1176"
},
{
"db": "NVD",
"id": "CVE-2020-6983"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-25T00:00:00",
"db": "IVD",
"id": "eba56277-eeb7-4731-9c4d-337185d89917"
},
{
"date": "2020-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-13512"
},
{
"date": "2020-04-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-003322"
},
{
"date": "2020-02-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202002-1176"
},
{
"date": "2020-03-24T19:15:21.257000",
"db": "NVD",
"id": "CVE-2020-6983"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-13512"
},
{
"date": "2020-04-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-003322"
},
{
"date": "2020-04-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202002-1176"
},
{
"date": "2024-11-21T05:36:25.897000",
"db": "NVD",
"id": "CVE-2020-6983"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202002-1176"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Moxa PT-7528 and PT-7828 Vulnerability in using hard-coded credentials in series firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003322"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202002-1176"
}
],
"trust": 0.6
}
}
VAR-202003-1610
Vulnerability from variot - Updated: 2024-11-23 21:36In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa. Attackers can use this vulnerability to obtain sensitive information
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202003-1610",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "pt-7528-8mst-16tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-wv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-24-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-f-24-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8ssc-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8ssc-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828 f-24",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 f-24-24",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 f-24-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 f-48",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 f-48-48",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 series",
"scope": "lte",
"trust": 0.6,
"vendor": "moxa",
"version": "\u003c=3.9"
},
{
"model": "pt-7528 series",
"scope": "lte",
"trust": 0.6,
"vendor": "moxa",
"version": "\u003c=4.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8ssc 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8ssc 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp wv wv",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "9566e086-c3ef-4608-93be-35191c9dc622"
},
{
"db": "CNVD",
"id": "CNVD-2020-13511"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003323"
},
{
"db": "NVD",
"id": "CVE-2020-6987"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-24_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-24-24_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-24-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-48_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-48-48_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003323"
}
]
},
"cve": "CVE-2020-6987",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2020-6987",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.1,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-003323",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-13511",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "9566e086-c3ef-4608-93be-35191c9dc622",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-6987",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-003323",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-6987",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "JVNDB-2020-003323",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2020-13511",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202002-1190",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "9566e086-c3ef-4608-93be-35191c9dc622",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-6987",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "9566e086-c3ef-4608-93be-35191c9dc622"
},
{
"db": "CNVD",
"id": "CNVD-2020-13511"
},
{
"db": "VULMON",
"id": "CVE-2020-6987"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003323"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1190"
},
{
"db": "NVD",
"id": "CVE-2020-6987"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa. Attackers can use this vulnerability to obtain sensitive information",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-6987"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003323"
},
{
"db": "CNVD",
"id": "CNVD-2020-13511"
},
{
"db": "IVD",
"id": "9566e086-c3ef-4608-93be-35191c9dc622"
},
{
"db": "VULMON",
"id": "CVE-2020-6987"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-6987",
"trust": 3.3
},
{
"db": "ICS CERT",
"id": "ICSA-20-056-03",
"trust": 3.1
},
{
"db": "CNVD",
"id": "CNVD-2020-13511",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1190",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003323",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2020.0725",
"trust": 0.6
},
{
"db": "IVD",
"id": "9566E086-C3EF-4608-93BE-35191C9DC622",
"trust": 0.2
},
{
"db": "VULMON",
"id": "CVE-2020-6987",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "9566e086-c3ef-4608-93be-35191c9dc622"
},
{
"db": "CNVD",
"id": "CNVD-2020-13511"
},
{
"db": "VULMON",
"id": "CVE-2020-6987"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003323"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1190"
},
{
"db": "NVD",
"id": "CVE-2020-6987"
}
]
},
"id": "VAR-202003-1610",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "9566e086-c3ef-4608-93be-35191c9dc622"
},
{
"db": "CNVD",
"id": "CNVD-2020-13511"
}
],
"trust": 1.5375
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "9566e086-c3ef-4608-93be-35191c9dc622"
},
{
"db": "CNVD",
"id": "CNVD-2020-13511"
}
]
},
"last_update_date": "2024-11-23T21:36:01.495000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.moxa.com/en/"
},
{
"title": "Patch for Moxa PT-7528 and PT-7828 Series Weak Password Algorithm Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/204851"
},
{
"title": "Moxa PT-7528 and PT-7828 Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110384"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-13511"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003323"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1190"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-327",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003323"
},
{
"db": "NVD",
"id": "CVE-2020-6987"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-6987"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6987"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.0725/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/327.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-13511"
},
{
"db": "VULMON",
"id": "CVE-2020-6987"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003323"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1190"
},
{
"db": "NVD",
"id": "CVE-2020-6987"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "9566e086-c3ef-4608-93be-35191c9dc622"
},
{
"db": "CNVD",
"id": "CNVD-2020-13511"
},
{
"db": "VULMON",
"id": "CVE-2020-6987"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003323"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1190"
},
{
"db": "NVD",
"id": "CVE-2020-6987"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-25T00:00:00",
"db": "IVD",
"id": "9566e086-c3ef-4608-93be-35191c9dc622"
},
{
"date": "2020-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-13511"
},
{
"date": "2020-03-24T00:00:00",
"db": "VULMON",
"id": "CVE-2020-6987"
},
{
"date": "2020-04-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-003323"
},
{
"date": "2020-02-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202002-1190"
},
{
"date": "2020-03-24T19:15:21.337000",
"db": "NVD",
"id": "CVE-2020-6987"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-13511"
},
{
"date": "2020-03-26T00:00:00",
"db": "VULMON",
"id": "CVE-2020-6987"
},
{
"date": "2020-04-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-003323"
},
{
"date": "2020-04-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202002-1190"
},
{
"date": "2024-11-21T05:36:26.417000",
"db": "NVD",
"id": "CVE-2020-6987"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202002-1190"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Moxa PT-7528 and PT-7828 Vulnerability in using cryptographic algorithms in series firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003323"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202002-1190"
}
],
"trust": 0.6
}
}
VAR-202003-1608
Vulnerability from variot - Updated: 2024-11-23 21:36In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, these devices use a hard-coded service code for access to the console. (DoS) It may be put into a state. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202003-1608",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "pt-7528-8mst-16tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-wv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-24-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-f-24-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8ssc-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8ssc-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828 series",
"scope": "lte",
"trust": 0.6,
"vendor": "moxa",
"version": "\u003c=3.9"
},
{
"model": "pt-7528 series",
"scope": "lte",
"trust": 0.6,
"vendor": "moxa",
"version": "\u003c=4.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8ssc 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8ssc 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp wv wv",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "c2284339-03a2-4473-87f3-c396444ea32f"
},
{
"db": "CNVD",
"id": "CNVD-2020-13513"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003383"
},
{
"db": "NVD",
"id": "CVE-2020-6985"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-wv_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003383"
}
]
},
"cve": "CVE-2020-6985",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2020-6985",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.1,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "JVNDB-2020-003383",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-13513",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "c2284339-03a2-4473-87f3-c396444ea32f",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-6985",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-003383",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-6985",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "JVNDB-2020-003383",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2020-13513",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202002-1171",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "c2284339-03a2-4473-87f3-c396444ea32f",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-6985",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "c2284339-03a2-4473-87f3-c396444ea32f"
},
{
"db": "CNVD",
"id": "CNVD-2020-13513"
},
{
"db": "VULMON",
"id": "CVE-2020-6985"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003383"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1171"
},
{
"db": "NVD",
"id": "CVE-2020-6985"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, these devices use a hard-coded service code for access to the console. (DoS) It may be put into a state. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-6985"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003383"
},
{
"db": "CNVD",
"id": "CNVD-2020-13513"
},
{
"db": "IVD",
"id": "c2284339-03a2-4473-87f3-c396444ea32f"
},
{
"db": "VULMON",
"id": "CVE-2020-6985"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-6985",
"trust": 3.3
},
{
"db": "ICS CERT",
"id": "ICSA-20-056-03",
"trust": 3.1
},
{
"db": "CNVD",
"id": "CNVD-2020-13513",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1171",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003383",
"trust": 0.8
},
{
"db": "NSFOCUS",
"id": "47434",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2020.0725",
"trust": 0.6
},
{
"db": "IVD",
"id": "C2284339-03A2-4473-87F3-C396444EA32F",
"trust": 0.2
},
{
"db": "VULMON",
"id": "CVE-2020-6985",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "c2284339-03a2-4473-87f3-c396444ea32f"
},
{
"db": "CNVD",
"id": "CNVD-2020-13513"
},
{
"db": "VULMON",
"id": "CVE-2020-6985"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003383"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1171"
},
{
"db": "NVD",
"id": "CVE-2020-6985"
}
]
},
"id": "VAR-202003-1608",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "c2284339-03a2-4473-87f3-c396444ea32f"
},
{
"db": "CNVD",
"id": "CNVD-2020-13513"
}
],
"trust": 1.5375
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "c2284339-03a2-4473-87f3-c396444ea32f"
},
{
"db": "CNVD",
"id": "CNVD-2020-13513"
}
]
},
"last_update_date": "2024-11-23T21:36:01.388000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.moxa.com/en/"
},
{
"title": "Patch for Moxa PT-7528 and PT-7828 Series Hard Credential Vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/204855"
},
{
"title": "Moxa PT-7528 and PT-7828 Repair measures for trust management problem vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110369"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-13513"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003383"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1171"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-798",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003383"
},
{
"db": "NVD",
"id": "CVE-2020-6985"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-6985"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6985"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47434"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.0725/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/798.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-13513"
},
{
"db": "VULMON",
"id": "CVE-2020-6985"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003383"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1171"
},
{
"db": "NVD",
"id": "CVE-2020-6985"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "c2284339-03a2-4473-87f3-c396444ea32f"
},
{
"db": "CNVD",
"id": "CNVD-2020-13513"
},
{
"db": "VULMON",
"id": "CVE-2020-6985"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003383"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1171"
},
{
"db": "NVD",
"id": "CVE-2020-6985"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-25T00:00:00",
"db": "IVD",
"id": "c2284339-03a2-4473-87f3-c396444ea32f"
},
{
"date": "2020-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-13513"
},
{
"date": "2020-03-24T00:00:00",
"db": "VULMON",
"id": "CVE-2020-6985"
},
{
"date": "2020-04-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-003383"
},
{
"date": "2020-02-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202002-1171"
},
{
"date": "2020-03-24T20:15:14.943000",
"db": "NVD",
"id": "CVE-2020-6985"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-03-02T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-13513"
},
{
"date": "2020-03-26T00:00:00",
"db": "VULMON",
"id": "CVE-2020-6985"
},
{
"date": "2020-04-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-003383"
},
{
"date": "2020-08-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202002-1171"
},
{
"date": "2024-11-21T05:36:26.153000",
"db": "NVD",
"id": "CVE-2020-6985"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202002-1171"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Moxa PT-7528 and PT-7828 Vulnerability in using hard-coded credentials in series firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003383"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202002-1171"
}
],
"trust": 0.6
}
}
VAR-202003-1665
Vulnerability from variot - Updated: 2024-11-23 21:36In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa. Attackers can use this vulnerability to obtain sensitive information
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202003-1665",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "pt-7528-8mst-16tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-wv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-24-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-f-24-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8ssc-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8ssc-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828 series",
"scope": "lte",
"trust": 0.6,
"vendor": "moxa",
"version": "\u003c=3.9"
},
{
"model": "pt-7528 series",
"scope": "lte",
"trust": 0.6,
"vendor": "moxa",
"version": "\u003c=4.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8ssc 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8ssc 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp wv wv",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "d3266e45-a69a-4140-ae05-e8339f6a6691"
},
{
"db": "CNVD",
"id": "CNVD-2020-13507"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003384"
},
{
"db": "NVD",
"id": "CVE-2020-6993"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-wv_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003384"
}
]
},
"cve": "CVE-2020-6993",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2020-6993",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-003384",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-13507",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "d3266e45-a69a-4140-ae05-e8339f6a6691",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-6993",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-003384",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-6993",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "JVNDB-2020-003384",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2020-13507",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202002-1164",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "d3266e45-a69a-4140-ae05-e8339f6a6691",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "d3266e45-a69a-4140-ae05-e8339f6a6691"
},
{
"db": "CNVD",
"id": "CNVD-2020-13507"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003384"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1164"
},
{
"db": "NVD",
"id": "CVE-2020-6993"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization. Moxa PT-7528 and PT-7828 Series are both Ethernet switches manufactured by Moxa. Attackers can use this vulnerability to obtain sensitive information",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-6993"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003384"
},
{
"db": "CNVD",
"id": "CNVD-2020-13507"
},
{
"db": "IVD",
"id": "d3266e45-a69a-4140-ae05-e8339f6a6691"
}
],
"trust": 2.34
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-6993",
"trust": 3.2
},
{
"db": "ICS CERT",
"id": "ICSA-20-056-03",
"trust": 3.0
},
{
"db": "CNVD",
"id": "CNVD-2020-13507",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1164",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003384",
"trust": 0.8
},
{
"db": "NSFOCUS",
"id": "47431",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "47492",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2020.0725",
"trust": 0.6
},
{
"db": "IVD",
"id": "D3266E45-A69A-4140-AE05-E8339F6A6691",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "d3266e45-a69a-4140-ae05-e8339f6a6691"
},
{
"db": "CNVD",
"id": "CNVD-2020-13507"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003384"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1164"
},
{
"db": "NVD",
"id": "CVE-2020-6993"
}
]
},
"id": "VAR-202003-1665",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "d3266e45-a69a-4140-ae05-e8339f6a6691"
},
{
"db": "CNVD",
"id": "CNVD-2020-13507"
}
],
"trust": 1.5375
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "d3266e45-a69a-4140-ae05-e8339f6a6691"
},
{
"db": "CNVD",
"id": "CNVD-2020-13507"
}
]
},
"last_update_date": "2024-11-23T21:36:01.354000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.moxa.com/en/"
},
{
"title": "Patch for Moxa PT-7528 and PT-7828 Series Information Disclosure Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/204859"
},
{
"title": "Moxa PT-7528 and PT-7828 Repair measures for information disclosure vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110364"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-13507"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003384"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1164"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003384"
},
{
"db": "NVD",
"id": "CVE-2020-6993"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.0,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-6993"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6993"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47492"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.0725/"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47431"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-13507"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003384"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1164"
},
{
"db": "NVD",
"id": "CVE-2020-6993"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "d3266e45-a69a-4140-ae05-e8339f6a6691"
},
{
"db": "CNVD",
"id": "CNVD-2020-13507"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003384"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1164"
},
{
"db": "NVD",
"id": "CVE-2020-6993"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-25T00:00:00",
"db": "IVD",
"id": "d3266e45-a69a-4140-ae05-e8339f6a6691"
},
{
"date": "2020-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-13507"
},
{
"date": "2020-04-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-003384"
},
{
"date": "2020-02-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202002-1164"
},
{
"date": "2020-03-24T20:15:15.023000",
"db": "NVD",
"id": "CVE-2020-6993"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-13507"
},
{
"date": "2020-04-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-003384"
},
{
"date": "2020-08-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202002-1164"
},
{
"date": "2024-11-21T05:36:27.113000",
"db": "NVD",
"id": "CVE-2020-6993"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202002-1164"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Moxa PT-7528 and PT-7828 Information leakage vulnerability in series firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003384"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202002-1164"
}
],
"trust": 0.6
}
}