Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-6989 (GCVE-0-2020-6989)
Vulnerability from cvelistv5 – Published: 2020-03-24 18:54 – Updated: 2024-08-04 09:18- CWE-121 - STACK-BASED BUFFER OVERFLOW CWE-121
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower |
Affected:
Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T09:18:02.547Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "STACK-BASED BUFFER OVERFLOW CWE-121",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-24T18:54:19.000Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2020-6989",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower",
"version": {
"version_data": [
{
"version_value": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "STACK-BASED BUFFER OVERFLOW CWE-121"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03",
"refsource": "MISC",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-6989",
"datePublished": "2020-03-24T18:54:19.000Z",
"dateReserved": "2020-01-14T00:00:00.000Z",
"dateUpdated": "2024-08-04T09:18:02.547Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2020-6989",
"date": "2026-04-25",
"epss": "0.01879",
"percentile": "0.83211"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-6989\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2020-03-24T19:15:21.400\",\"lastModified\":\"2024-11-21T05:36:26.670\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code.\"},{\"lang\":\"es\",\"value\":\"En Moxa la serie PT-7528 firmware, versiones 4.0 o inferiores y la serie PT-7828 firmware, versiones 3.9 o inferiores, un desbordamiento del b\u00fafer en el servidor web permite a atacantes remotos causar una condici\u00f3n de denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-24tx-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"23172D9F-8C29-436C-8D1D-C6C69A7D544B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-24tx-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A8DA48C-AC0C-4134-96E5-58D1DE15E83F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-24tx-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"87870519-31E2-438F-9E4B-80C1E960BAA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-24tx-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4161EA3-F10A-4311-9C91-A19CFD97B6E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-24tx-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"9662C706-550D-4A2A-B811-46FC67D4ECD8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-24tx-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB152B69-992F-4C89-A5C5-00F67E19BC9B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-24tx-wv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"9E2ECB8C-6E44-4884-A543-92B3FADBF913\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-24tx-wv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"941BB098-D358-4F8C-BCD6-0AE9E1F9B515\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-24tx-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"8350B35C-F6AD-49ED-B165-A318EFCF9057\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-24tx-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B4B95C-7D87-4F5A-9499-97FBA99A93FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"598CFEF6-EDE3-4446-BF7B-459E2AC51D43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CFBC387-D664-4789-B3F7-7B87667963EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"F4B85577-5789-49D4-8F55-E9674BFAADE8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C532A7-AFC5-4F8B-9FCA-365DE8CAAD41\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"20CF217C-21DD-4181-9489-B59168E48B69\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"310FA2C6-C219-4C22-BABD-8CD3B4DBA20A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"7E30F784-5FC1-4F9B-8E87-939028052B9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B10C85C-B21A-427F-B8DA-5D7EB00382F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"DAF33C5F-51BA-433F-96F5-C56DA78DA78E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB085777-7FC8-4FC5-869C-9DF351B16799\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"D0A1D658-9F40-4D0D-A243-EF91342224DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAEA10F5-9E52-4658-851A-7ABDD4135E90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"1B21B040-6F79-4845-8A57-51361637401D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33B5BB02-8C2F-4E98-BB60-E5F261681C19\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"63B66690-697D-4DD0-A7FF-83185174E8EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47AA88D4-4BCF-43C4-BDD3-2F8C8E596046\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"1FBF1C1B-3DA2-4EE4-A36B-83C5B84232E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0414660-74EF-49F0-9DBA-0305B835D408\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"46683121-C8D6-40C9-86F0-A3F44977BD71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4DD3C6-78B5-4458-B487-63D37027CF99\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"3CF72041-8378-497F-86EF-E7AE3B7A855C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C16033-43B1-41C0-87E7-4ABEB1EA6761\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"76DF7328-037B-4D75-BFF1-D22FE32D1F9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"674D3631-53DF-4E98-BC1E-C4122DF3F26A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"A376430A-4F8E-4B91-83E4-C9D14A601C2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB472079-8ECF-44E2-969E-4FB5CF0E3971\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"055969EC-1F60-4F95-B686-535A71F5F496\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A7A8554-54A1-4B4C-A583-90FC0EC49A11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"379BD1B2-68D5-4BB2-A816-DCB69183267D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E4FE31-0EC0-4034-8099-BCEC33E421ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"A249EAAC-7B5C-4ADA-A5D1-E612D2F580F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6431F64E-9899-4F01-8814-1A92A36353C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"41C54026-899E-4D3C-8ECD-B9D1C6751B26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D937271E-9E14-446A-B5DD-7B1E6D2B5C9C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"0783C349-5E13-4B8E-BE92-DFB18DE31643\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CE86A9B-1C3F-4208-A238-3E70031D3856\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"567BC006-28FB-44F2-A779-B4B8320F3A3B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D9E901-A046-4CC2-A3E5-42E42EA3308C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"8C377E2E-43F1-4CDA-9386-074374EFD71C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABF64C98-AF29-4C56-9E21-081E5DBE0B79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"83852BAA-F68C-4273-B822-25280EBE3D00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F676041D-CF87-403D-9911-5B6DA9B21CC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"0B07BFA5-350C-401A-B063-B0322157784C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECF8194D-BAA0-4F1F-AAC3-C5B96E4D0368\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"42E2DDC4-5EEE-459D-AAB4-18AC1573C5F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C73920-8D86-4511-981D-944AD53965D2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"4F8503F5-454C-4EB9-86DC-853CB7D3BF9C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65AAE0BE-B955-428C-8DB3-EDC69D513B0A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"86246FAC-8D36-41FE-85EC-9362D938A85B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CCCFD34-9E11-4F33-AE7B-4F20F7B3A1C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"0F63B515-D60A-41C8-AD93-DBCE2440E6AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F36333F5-C4F5-4BB2-940C-88D9F886D398\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"F703C1A8-E64A-4486-9F1A-11D0FF4EC5CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEA388CA-199C-487F-82F0-752FFA204286\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"6E7BA6AA-9EE5-46A8-AC4C-466A87159D95\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"145A2735-5820-4060-80A0-51F3D7CABCCE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"DB462B54-F23B-4939-B9DF-2DFDE242C322\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E6D37D-CD68-4E62-97BA-B6E87565C04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"2896256B-54D6-45EC-9F23-9D27ABD04FBD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64A930B4-B043-4AF9-95E4-562AB65A9CDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"86638803-6014-4DE7-BBC9-26F2137368FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B29B0F1-0575-4EFF-9A45-6E86526A2C19\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"C202168C-3666-4726-93A4-8AA0F910B322\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6711A4E5-F1D8-4C4E-BD2A-52FB66F670F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"4B0F7D65-7F08-4AFA-A30A-E29DCDFD49A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75ADE518-83D1-4275-8E55-5412238EFC86\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0\",\"matchCriteriaId\":\"5DD1476B-B648-4EB7-A233-75FFDC4FCF1E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C689B536-4889-4BA1-AB29-ACE7C5DC952D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-24_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"FADBEE27-6C34-4F1C-B1FF-FC90263D3CB8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91F7180-8FC6-4A74-B59E-D11E9AC529A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-24-24_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"748065CA-4349-48DC-96D9-0FB05F3BF098\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-24-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69EEDC14-3565-4808-9EC5-F27B201D48B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-24-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"2E768FF9-FAEB-44D1-95E5-8A416C934371\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-24-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEADBFB7-64EB-4E1B-86DB-364E2F0111D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-48_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"4E4C480A-5367-46C1-85A5-E3210E0C670A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17BF3C14-D5BE-4369-867E-7DEE972FEC97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-48-48_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"749457D9-5269-43C3-A6A2-F1DF27D87F1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-48-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ABB933B-A0CB-431E-A51D-EB630BFE92D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-48-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"D9A526F2-8568-4088-87AF-B63D5063594B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-48-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29F68ADA-AE16-4FFC-9374-2AFFBCCFBF57\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"3695DC89-A027-49A6-A39E-77BDAE7A424E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F572FA7-7520-4F5F-8398-42B3788C8B8A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-f-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"CD226E1F-DAE6-47B5-B5F3-46FAE2B7C2FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-f-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9B389AF-83A2-4A35-96BE-7971B1B3E4FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-24_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"238EAECC-E3A2-426B-9A5A-9F48D985B322\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08EF9BFC-B45B-4F5E-8745-B335EFE638A5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-24-24_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"A07EA3C4-2722-43B4-9AD7-EFCD92BDCED8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-24-24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F88B615C-BE6A-4B1C-95A7-5B37796159C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-24-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"5058559A-1141-4B2C-AD06-58DD3E590C56\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-24-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D507239-F351-4DA0-80D0-96ACB9419EC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-48_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"9018404B-910F-4247-AB18-CA644A052FEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91198EE7-4205-478E-B7A8-987F977AD82C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-48-48_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"189D5ACC-D0F2-428B-A90C-2FA39D6D6C20\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-48-48:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02DA7C0A-2F37-461D-AFA8-BF73C653F47E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-48-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"41D304A9-E038-44F4-A139-896A51DB25A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-48-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EA7D60F-4670-4AAE-8A31-89C60A38EA43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"33B8C349-4B07-4172-A629-4C0FBDE943A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392DB5FC-65AA-4E08-8E9F-AA66F6135078\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:moxa:pt-7828-r-hv-hv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9\",\"matchCriteriaId\":\"E8F1E348-4C0F-420B-9275-2D5257D6E8BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:moxa:pt-7828-r-hv-hv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC4F8DC4-26C0-4D82-A7B6-8285158A1F21\"}]}]}],\"references\":[{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-20-056-03\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-20-056-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
}
}
GHSA-F3PG-XH2R-FCRW
Vulnerability from github – Published: 2022-05-24 17:12 – Updated: 2022-05-24 17:12In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code.
{
"affected": [],
"aliases": [
"CVE-2020-6989"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-03-24T19:15:00Z",
"severity": "HIGH"
},
"details": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code.",
"id": "GHSA-f3pg-xh2r-fcrw",
"modified": "2022-05-24T17:12:35Z",
"published": "2022-05-24T17:12:35Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6989"
},
{
"type": "WEB",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
}
],
"schema_version": "1.4.0",
"severity": []
}
BDU:2019-03276
Vulnerability from fstec - Published: 01.09.2017{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Moxa Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 4.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (PT-7528), \u0434\u043e 3.9 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (PT-7828)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.moxa.com/en/support/support/security-advisory/pt-7528-7828-ethernet-switches-vulnerabilities",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "01.09.2017",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "25.09.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-03276",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-6989",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "PT-7528, PT-7828",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Ethernet-\u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u043e\u0432 Moxa PT-7528 \u0438 Moxa PT-7828, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0441\u0442\u0435\u043a\u0435 (CWE-121)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Ethernet-\u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u043e\u0432 Moxa PT-7528 \u0438 Moxa PT-7828 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0441\u0442\u0435\u043a\u0435. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043f\u0430\u043a\u0435\u0442\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03\nhttps://www.moxa.com/en/support/support/security-advisory/pt-7528-7828-ethernet-switches-vulnerabilities",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-121",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)"
}
BDU:2019-03259
Vulnerability from fstec - Published: 09.05.2017{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Moxa Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 5.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Moxa EDS-G516E), \u0434\u043e 5.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Moxa EDS-510E)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.moxa.com/en/support/support/security-advisory/eds-g516e-510e-ethernet-switches-vulnerabilities",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "09.05.2017",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "25.09.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-03259",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-6989",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Moxa EDS-G516E, Moxa EDS-510E",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 SwitchDHCPSetting \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u043e\u0432 Moxa EDS-G516E \u0438 Moxa EDS-510E, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (\u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430) (CWE-120)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 SwitchDHCPSetting \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u043e\u0432 Moxa EDS-G516E \u0438 Moxa EDS-510E \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u043f\u0443\u0442\u0435\u043c \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.moxa.com/en/support/support/security-advisory/eds-g516e-510e-ethernet-switches-vulnerabilities\nhttps://www.us-cert.gov/ics/advisories/icsa-20-056-04",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-120",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}
GSD-2020-6989
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-6989",
"description": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code.",
"id": "GSD-2020-6989"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-6989"
],
"details": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code.",
"id": "GSD-2020-6989",
"modified": "2023-12-13T01:21:54.858544Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2020-6989",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower",
"version": {
"version_data": [
{
"version_value": "Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "STACK-BASED BUFFER OVERFLOW CWE-121"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03",
"refsource": "MISC",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-24tx-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-24tx-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-24tx-hv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-24tx-hv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-24tx-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-24tx-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-24tx-wv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-24tx-wv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-24tx-wv-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-24tx-wv-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-f-24_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-f-24:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-f-24-24_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-f-24-24:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-f-24-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-f-24-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-f-48_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-f-48:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-f-48-48_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-f-48-48:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-f-48-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-f-48-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-f-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-f-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-f-hv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-f-hv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-r-24_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-r-24:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-r-24-24_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-r-24-24:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-r-24-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-r-24-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-r-48_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-r-48:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-r-48-48_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-r-48-48:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-r-48-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-r-48-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-r-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-r-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:pt-7828-r-hv-hv_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:pt-7828-r-hv-hv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2020-6989"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-03-26T19:46Z",
"publishedDate": "2020-03-24T19:15Z"
}
}
}
VAR-202003-1612
Vulnerability from variot - Updated: 2024-11-23 21:36In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code. Moxa PT-7528 and PT-7828 A series firmware contains a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa.
Moxa EDS-G516E and EDS-510E series have a buffer overflow vulnerability, which can be exploited by an attacker to cause a buffer overflow
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202003-1612",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "pt-7528-8mst-16tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-wv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-24-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-f-24-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16mst-8tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12mst-12tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8mst-16tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-8ssc-16tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8msc-16tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24-24",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20mst-4tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-16msc-8tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-f-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828-r-48",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-12msc-12tx-4gsfp-hv-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-8ssc-16tx-4gsfp-wv-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-20msc-4tx-4gsfp-wv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828-r-24-hv",
"scope": "lte",
"trust": 1.0,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7528-24tx-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-hv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7528-24tx-wv-wv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "4.0"
},
{
"model": "pt-7828 f-24",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 f-24-24",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 f-24-hv",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 f-48",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "pt-7828 f-48-48",
"scope": "eq",
"trust": 0.8,
"vendor": "moxa",
"version": "3.9"
},
{
"model": "eds-510e series",
"scope": "lte",
"trust": 0.6,
"vendor": "moxa",
"version": "\u003c=5.2"
},
{
"model": "eds-g516e series",
"scope": "lte",
"trust": 0.6,
"vendor": "moxa",
"version": "\u003c=5.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12mst 12tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16msc 8tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 16mst 8tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20msc 4tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 20mst 4tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8msc 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8mst 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8ssc 16tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 8ssc 16tx 4gsfp wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 24 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f 48 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 f hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24 24",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 24tx wv wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 24 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48 48",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r 48 hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7828 r hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp hv hv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp wv",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "pt 7528 12msc 12tx 4gsfp wv wv",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b"
},
{
"db": "CNVD",
"id": "CNVD-2020-13508"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003324"
},
{
"db": "NVD",
"id": "CVE-2020-6989"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-hv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7528-24tx-wv-wv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-24_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-24-24_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-24-hv_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-48_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:moxa:pt-7828-f-48-48_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003324"
}
]
},
"cve": "CVE-2020-6989",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2020-6989",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.1,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-003324",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-13508",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-6989",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-003324",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-6989",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "JVNDB-2020-003324",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2020-13508",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202002-1174",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-6989",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b"
},
{
"db": "CNVD",
"id": "CNVD-2020-13508"
},
{
"db": "VULMON",
"id": "CVE-2020-6989"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003324"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1174"
},
{
"db": "NVD",
"id": "CVE-2020-6989"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code. Moxa PT-7528 and PT-7828 A series firmware contains a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Moxa EDS-G516E and EDS-510E series are Ethernet switches manufactured by Moxa. \n\r\n\r\nMoxa EDS-G516E and EDS-510E series have a buffer overflow vulnerability, which can be exploited by an attacker to cause a buffer overflow",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-6989"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003324"
},
{
"db": "CNVD",
"id": "CNVD-2020-13508"
},
{
"db": "IVD",
"id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b"
},
{
"db": "VULMON",
"id": "CVE-2020-6989"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-6989",
"trust": 3.3
},
{
"db": "ICS CERT",
"id": "ICSA-20-056-03",
"trust": 2.5
},
{
"db": "CNVD",
"id": "CNVD-2020-13508",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1174",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003324",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-20-056-04",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2020.0726",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "47437",
"trust": 0.6
},
{
"db": "IVD",
"id": "A9490CC0-BCF2-409D-BCB5-EDFE1E07190B",
"trust": 0.2
},
{
"db": "VULMON",
"id": "CVE-2020-6989",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b"
},
{
"db": "CNVD",
"id": "CNVD-2020-13508"
},
{
"db": "VULMON",
"id": "CVE-2020-6989"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003324"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1174"
},
{
"db": "NVD",
"id": "CVE-2020-6989"
}
]
},
"id": "VAR-202003-1612",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b"
},
{
"db": "CNVD",
"id": "CNVD-2020-13508"
}
],
"trust": 1.5375
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b"
},
{
"db": "CNVD",
"id": "CNVD-2020-13508"
}
]
},
"last_update_date": "2024-11-23T21:36:01.726000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.moxa.com/en/"
},
{
"title": "Patch for Moxa EDS-G516E and EDS-510E series buffer overflow vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/204843"
},
{
"title": "Moxa PT-7528 and PT-7828 Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110371"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-13508"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003324"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1174"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.8
},
{
"problemtype": "CWE-121",
"trust": 1.0
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003324"
},
{
"db": "NVD",
"id": "CVE-2020-6989"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-6989"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6989"
},
{
"trust": 0.6,
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.0726/"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47437"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/787.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/176778"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-13508"
},
{
"db": "VULMON",
"id": "CVE-2020-6989"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003324"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1174"
},
{
"db": "NVD",
"id": "CVE-2020-6989"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b"
},
{
"db": "CNVD",
"id": "CNVD-2020-13508"
},
{
"db": "VULMON",
"id": "CVE-2020-6989"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-003324"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1174"
},
{
"db": "NVD",
"id": "CVE-2020-6989"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-25T00:00:00",
"db": "IVD",
"id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b"
},
{
"date": "2020-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-13508"
},
{
"date": "2020-03-24T00:00:00",
"db": "VULMON",
"id": "CVE-2020-6989"
},
{
"date": "2020-04-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-003324"
},
{
"date": "2020-02-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202002-1174"
},
{
"date": "2020-03-24T19:15:21.400000",
"db": "NVD",
"id": "CVE-2020-6989"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-13508"
},
{
"date": "2020-03-26T00:00:00",
"db": "VULMON",
"id": "CVE-2020-6989"
},
{
"date": "2020-04-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-003324"
},
{
"date": "2020-08-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202002-1174"
},
{
"date": "2024-11-21T05:36:26.670000",
"db": "NVD",
"id": "CVE-2020-6989"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202002-1174"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Moxa PT-7528 and PT-7828 Out-of-bounds write vulnerabilities in series firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-003324"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "a9490cc0-bcf2-409d-bcb5-edfe1e07190b"
},
{
"db": "CNNVD",
"id": "CNNVD-202002-1174"
}
],
"trust": 0.8
}
}
ICSA-20-056-03
Vulnerability from csaf_cisa - Published: 2020-02-25 00:00 - Updated: 2020-02-25 00:00{
"document": {
"acknowledgments": [
{
"names": [
"Ilya Karpov",
"Evgeniy Druzhinin"
],
"organization": "Rostelecom-Solar",
"summary": "reporting these vulnerabilities to Moxa"
},
{
"names": [
"Georgy Zaytsev"
],
"organization": "Positive Technologies",
"summary": "reporting these vulnerabilities to Moxa"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could crash the device or allow access to sensitive information.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing, Energy, Water and Wastewater Systems",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Taiwan",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target these vulnerabilities.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-20-056-03 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-056-03.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-20-056-03 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-056-03"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.us-cert.gov/ncas/tips/ST04-014"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Moxa PT-7528 and PT-7828 Series Ethernet Switches",
"tracking": {
"current_release_date": "2020-02-25T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-20-056-03",
"initial_release_date": "2020-02-25T00:00:00.000000Z",
"revision_history": [
{
"date": "2020-02-25T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-20-056-03 Moxa PT-7528 and PT-7828 Series Ethernet Switches"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 4.0",
"product": {
"name": "PT-7528 series: firmware Version 4.0 or lower",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "PT-7528 series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 3.9",
"product": {
"name": "PT-7828 series: firmware Version 3.9 or lower",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "PT-7828 series"
}
],
"category": "vendor",
"name": "Moxa"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-6989",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code. CVE-2020-6989 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H ).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-6989"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Moxa has developed a solution to address these vulnerabilities: Please contact Moxa Technical Support for a security patch.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.moxa.com/support/support/technical-support"
},
{
"category": "mitigation",
"details": "Moxa also recommends that users apply the security patch and enable \u201cAccount Login Failure Lockout\u201d functions to eliminate any potential risk.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Please see Moxa\u0027s security advisory for more information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.moxa.com/en/support/support/security-advisory/pt-7528-7828-ethernet-switches-vulnerabilities"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-6987",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "The affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed. CVE-2020-6987 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-6987"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Moxa has developed a solution to address these vulnerabilities: Please contact Moxa Technical Support for a security patch.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.moxa.com/support/support/technical-support"
},
{
"category": "mitigation",
"details": "Moxa also recommends that users apply the security patch and enable \u201cAccount Login Failure Lockout\u201d functions to eliminate any potential risk.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Please see Moxa\u0027s security advisory for more information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.moxa.com/en/support/support/security-advisory/pt-7528-7828-ethernet-switches-vulnerabilities"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-6983",
"cwe": {
"id": "CWE-321",
"name": "Use of Hard-coded Cryptographic Key"
},
"notes": [
{
"category": "summary",
"text": "The affected products use a hard-coded cryptographic key, which increases the possibility that confidential data can be recovered. CVE-2020-6983 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-6983"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Moxa has developed a solution to address these vulnerabilities: Please contact Moxa Technical Support for a security patch.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.moxa.com/support/support/technical-support"
},
{
"category": "mitigation",
"details": "Moxa also recommends that users apply the security patch and enable \u201cAccount Login Failure Lockout\u201d functions to eliminate any potential risk.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Please see Moxa\u0027s security advisory for more information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.moxa.com/en/support/support/security-advisory/pt-7528-7828-ethernet-switches-vulnerabilities"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-6985",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "summary",
"text": "These devices use a hard-coded service code for access to the console. CVE-2020-6985 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-6985"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Moxa has developed a solution to address these vulnerabilities: Please contact Moxa Technical Support for a security patch.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.moxa.com/support/support/technical-support"
},
{
"category": "mitigation",
"details": "Moxa also recommends that users apply the security patch and enable \u201cAccount Login Failure Lockout\u201d functions to eliminate any potential risk.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Please see Moxa\u0027s security advisory for more information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.moxa.com/en/support/support/security-advisory/pt-7528-7828-ethernet-switches-vulnerabilities"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-6995",
"cwe": {
"id": "CWE-521",
"name": "Weak Password Requirements"
},
"notes": [
{
"category": "summary",
"text": "The application utilizes weak password requirements, which may allow an attacker to gain unauthorized access. CVE-2020-6995 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-6995"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Moxa has developed a solution to address these vulnerabilities: Please contact Moxa Technical Support for a security patch.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.moxa.com/support/support/technical-support"
},
{
"category": "mitigation",
"details": "Moxa also recommends that users apply the security patch and enable \u201cAccount Login Failure Lockout\u201d functions to eliminate any potential risk.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Please see Moxa\u0027s security advisory for more information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.moxa.com/en/support/support/security-advisory/pt-7528-7828-ethernet-switches-vulnerabilities"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
},
{
"cve": "CVE-2020-6993",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "An attacker can access to sensitive information from the web service without authorization. CVE-2020-6993 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-6993"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Moxa has developed a solution to address these vulnerabilities: Please contact Moxa Technical Support for a security patch.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.moxa.com/support/support/technical-support"
},
{
"category": "mitigation",
"details": "Moxa also recommends that users apply the security patch and enable \u201cAccount Login Failure Lockout\u201d functions to eliminate any potential risk.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Please see Moxa\u0027s security advisory for more information.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
],
"url": "https://www.moxa.com/en/support/support/security-advisory/pt-7528-7828-ethernet-switches-vulnerabilities"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
]
}
]
}
CNVD-2020-13508
Vulnerability from cnvd - Published: 2020-02-26厂商已发布了漏洞修复程序,请及时关注更新: https://www.moxa.com/en/support/product-support/software-and-documentation/search?psid=49216
| Name | ['Moxa EDS-510E Series firmware <=5.2', 'Moxa EDS-G516E Series firmware <=5.2'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-6989"
}
},
"description": "Moxa EDS-G516E\u548cEDS-510E series\u90fd\u662fMoxa\u751f\u4ea7\u7684\u4ee5\u592a\u7f51\u4ea4\u6362\u673a\u3002\n\nMoxa EDS-G516E\u548cEDS-510E series\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.moxa.com/en/support/product-support/software-and-documentation/search?psid=49216",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-13508",
"openTime": "2020-02-26",
"patchDescription": "Moxa EDS-G516E\u548cEDS-510E series\u90fd\u662fMoxa\u751f\u4ea7\u7684\u4ee5\u592a\u7f51\u4ea4\u6362\u673a\u3002\r\n\r\nMoxa EDS-G516E\u548cEDS-510E series\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Moxa EDS-G516E\u548cEDS-510E series\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Moxa EDS-510E Series firmware \u003c=5.2",
"Moxa EDS-G516E Series firmware \u003c=5.2"
]
},
"referenceLink": "https://www.us-cert.gov/ics/advisories/icsa-20-056-04",
"serverity": "\u9ad8",
"submitTime": "2020-02-26",
"title": "Moxa EDS-G516E\u548cEDS-510E series\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}
FKIE_CVE-2020-6989
Vulnerability from fkie_nvd - Published: 2020-03-24 19:15 - Updated: 2024-11-21 05:36| URL | Tags | ||
|---|---|---|---|
| ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-056-03 | Third Party Advisory, US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| moxa | pt-7528-24tx-hv_firmware | * | |
| moxa | pt-7528-24tx-hv | - | |
| moxa | pt-7528-24tx-hv-hv_firmware | * | |
| moxa | pt-7528-24tx-hv-hv | - | |
| moxa | pt-7528-24tx-wv_firmware | * | |
| moxa | pt-7528-24tx-wv | - | |
| moxa | pt-7528-24tx-wv-hv_firmware | * | |
| moxa | pt-7528-24tx-wv-hv | - | |
| moxa | pt-7528-24tx-wv-wv_firmware | * | |
| moxa | pt-7528-24tx-wv-wv | - | |
| moxa | pt-7528-12msc-12tx-4gsfp-hv_firmware | * | |
| moxa | pt-7528-12msc-12tx-4gsfp-hv | - | |
| moxa | pt-7528-12msc-12tx-4gsfp-hv-hv_firmware | * | |
| moxa | pt-7528-12msc-12tx-4gsfp-hv-hv | - | |
| moxa | pt-7528-12msc-12tx-4gsfp-wv_firmware | * | |
| moxa | pt-7528-12msc-12tx-4gsfp-wv | - | |
| moxa | pt-7528-12msc-12tx-4gsfp-wv-wv_firmware | * | |
| moxa | pt-7528-12msc-12tx-4gsfp-wv-wv | - | |
| moxa | pt-7528-12mst-12tx-4gsfp-hv_firmware | * | |
| moxa | pt-7528-12mst-12tx-4gsfp-hv | - | |
| moxa | pt-7528-12mst-12tx-4gsfp-hv-hv_firmware | * | |
| moxa | pt-7528-12mst-12tx-4gsfp-hv-hv | - | |
| moxa | pt-7528-12mst-12tx-4gsfp-wv_firmware | * | |
| moxa | pt-7528-12mst-12tx-4gsfp-wv | - | |
| moxa | pt-7528-12mst-12tx-4gsfp-wv-wv_firmware | * | |
| moxa | pt-7528-12mst-12tx-4gsfp-wv-wv | - | |
| moxa | pt-7528-16msc-8tx-4gsfp-hv_firmware | * | |
| moxa | pt-7528-16msc-8tx-4gsfp-hv | - | |
| moxa | pt-7528-16msc-8tx-4gsfp-hv-hv_firmware | * | |
| moxa | pt-7528-16msc-8tx-4gsfp-hv-hv | - | |
| moxa | pt-7528-16msc-8tx-4gsfp-wv_firmware | * | |
| moxa | pt-7528-16msc-8tx-4gsfp-wv | - | |
| moxa | pt-7528-16msc-8tx-4gsfp-wv-wv_firmware | * | |
| moxa | pt-7528-16msc-8tx-4gsfp-wv-wv | - | |
| moxa | pt-7528-16mst-8tx-4gsfp-hv_firmware | * | |
| moxa | pt-7528-16mst-8tx-4gsfp-hv | - | |
| moxa | pt-7528-16mst-8tx-4gsfp-hv-hv_firmware | * | |
| moxa | pt-7528-16mst-8tx-4gsfp-hv-hv | - | |
| moxa | pt-7528-16mst-8tx-4gsfp-wv_firmware | * | |
| moxa | pt-7528-16mst-8tx-4gsfp-wv | - | |
| moxa | pt-7528-16mst-8tx-4gsfp-wv-wv_firmware | * | |
| moxa | pt-7528-16mst-8tx-4gsfp-wv-wv | - | |
| moxa | pt-7528-20msc-4tx-4gsfp-hv_firmware | * | |
| moxa | pt-7528-20msc-4tx-4gsfp-hv | - | |
| moxa | pt-7528-20msc-4tx-4gsfp-hv-hv_firmware | * | |
| moxa | pt-7528-20msc-4tx-4gsfp-hv-hv | - | |
| moxa | pt-7528-20msc-4tx-4gsfp-wv_firmware | * | |
| moxa | pt-7528-20msc-4tx-4gsfp-wv | - | |
| moxa | pt-7528-20msc-4tx-4gsfp-wv-wv_firmware | * | |
| moxa | pt-7528-20msc-4tx-4gsfp-wv-wv | - | |
| moxa | pt-7528-20mst-4tx-4gsfp-hv_firmware | * | |
| moxa | pt-7528-20mst-4tx-4gsfp-hv | - | |
| moxa | pt-7528-20mst-4tx-4gsfp-hv-hv_firmware | * | |
| moxa | pt-7528-20mst-4tx-4gsfp-hv-hv | - | |
| moxa | pt-7528-20mst-4tx-4gsfp-wv_firmware | * | |
| moxa | pt-7528-20mst-4tx-4gsfp-wv | - | |
| moxa | pt-7528-20mst-4tx-4gsfp-wv-wv_firmware | * | |
| moxa | pt-7528-20mst-4tx-4gsfp-wv-wv | - | |
| moxa | pt-7528-8msc-16tx-4gsfp-hv_firmware | * | |
| moxa | pt-7528-8msc-16tx-4gsfp-hv | - | |
| moxa | pt-7528-8msc-16tx-4gsfp-hv-hv_firmware | * | |
| moxa | pt-7528-8msc-16tx-4gsfp-hv-hv | - | |
| moxa | pt-7528-8msc-16tx-4gsfp-wv_firmware | * | |
| moxa | pt-7528-8msc-16tx-4gsfp-wv | - | |
| moxa | pt-7528-8msc-16tx-4gsfp-wv-wv_firmware | * | |
| moxa | pt-7528-8msc-16tx-4gsfp-wv-wv | - | |
| moxa | pt-7528-8mst-16tx-4gsfp-hv_firmware | * | |
| moxa | pt-7528-8mst-16tx-4gsfp-hv | - | |
| moxa | pt-7528-8mst-16tx-4gsfp-hv-hv_firmware | * | |
| moxa | pt-7528-8mst-16tx-4gsfp-hv-hv | - | |
| moxa | pt-7528-8mst-16tx-4gsfp-wv_firmware | * | |
| moxa | pt-7528-8mst-16tx-4gsfp-wv | - | |
| moxa | pt-7528-8mst-16tx-4gsfp-wv-wv_firmware | * | |
| moxa | pt-7528-8mst-16tx-4gsfp-wv-wv | - | |
| moxa | pt-7528-8ssc-16tx-4gsfp-hv-hv_firmware | * | |
| moxa | pt-7528-8ssc-16tx-4gsfp-hv-hv | - | |
| moxa | pt-7528-8ssc-16tx-4gsfp-wv-wv_firmware | * | |
| moxa | pt-7528-8ssc-16tx-4gsfp-wv-wv | - | |
| moxa | pt-7828-f-24_firmware | * | |
| moxa | pt-7828-f-24 | - | |
| moxa | pt-7828-f-24-24_firmware | * | |
| moxa | pt-7828-f-24-24 | - | |
| moxa | pt-7828-f-24-hv_firmware | * | |
| moxa | pt-7828-f-24-hv | - | |
| moxa | pt-7828-f-48_firmware | * | |
| moxa | pt-7828-f-48 | - | |
| moxa | pt-7828-f-48-48_firmware | * | |
| moxa | pt-7828-f-48-48 | - | |
| moxa | pt-7828-f-48-hv_firmware | * | |
| moxa | pt-7828-f-48-hv | - | |
| moxa | pt-7828-f-hv_firmware | * | |
| moxa | pt-7828-f-hv | - | |
| moxa | pt-7828-f-hv-hv_firmware | * | |
| moxa | pt-7828-f-hv-hv | - | |
| moxa | pt-7828-r-24_firmware | * | |
| moxa | pt-7828-r-24 | - | |
| moxa | pt-7828-r-24-24_firmware | * | |
| moxa | pt-7828-r-24-24 | - | |
| moxa | pt-7828-r-24-hv_firmware | * | |
| moxa | pt-7828-r-24-hv | - | |
| moxa | pt-7828-r-48_firmware | * | |
| moxa | pt-7828-r-48 | - | |
| moxa | pt-7828-r-48-48_firmware | * | |
| moxa | pt-7828-r-48-48 | - | |
| moxa | pt-7828-r-48-hv_firmware | * | |
| moxa | pt-7828-r-48-hv | - | |
| moxa | pt-7828-r-hv_firmware | * | |
| moxa | pt-7828-r-hv | - | |
| moxa | pt-7828-r-hv-hv_firmware | * | |
| moxa | pt-7828-r-hv-hv | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23172D9F-8C29-436C-8D1D-C6C69A7D544B",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8DA48C-AC0C-4134-96E5-58D1DE15E83F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-24tx-hv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "87870519-31E2-438F-9E4B-80C1E960BAA6",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-24tx-hv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4161EA3-F10A-4311-9C91-A19CFD97B6E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9662C706-550D-4A2A-B811-46FC67D4ECD8",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB152B69-992F-4C89-A5C5-00F67E19BC9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2ECB8C-6E44-4884-A543-92B3FADBF913",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "941BB098-D358-4F8C-BCD6-0AE9E1F9B515",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-24tx-wv-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8350B35C-F6AD-49ED-B165-A318EFCF9057",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-24tx-wv-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B4B95C-7D87-4F5A-9499-97FBA99A93FD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "598CFEF6-EDE3-4446-BF7B-459E2AC51D43",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CFBC387-D664-4789-B3F7-7B87667963EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4B85577-5789-49D4-8F55-E9674BFAADE8",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76C532A7-AFC5-4F8B-9FCA-365DE8CAAD41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20CF217C-21DD-4181-9489-B59168E48B69",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "310FA2C6-C219-4C22-BABD-8CD3B4DBA20A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7E30F784-5FC1-4F9B-8E87-939028052B9F",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-12msc-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B10C85C-B21A-427F-B8DA-5D7EB00382F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF33C5F-51BA-433F-96F5-C56DA78DA78E",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB085777-7FC8-4FC5-869C-9DF351B16799",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0A1D658-9F40-4D0D-A243-EF91342224DA",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAEA10F5-9E52-4658-851A-7ABDD4135E90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B21B040-6F79-4845-8A57-51361637401D",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33B5BB02-8C2F-4E98-BB60-E5F261681C19",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63B66690-697D-4DD0-A7FF-83185174E8EC",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-12mst-12tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47AA88D4-4BCF-43C4-BDD3-2F8C8E596046",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBF1C1B-3DA2-4EE4-A36B-83C5B84232E6",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0414660-74EF-49F0-9DBA-0305B835D408",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46683121-C8D6-40C9-86F0-A3F44977BD71",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF4DD3C6-78B5-4458-B487-63D37027CF99",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CF72041-8378-497F-86EF-E7AE3B7A855C",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62C16033-43B1-41C0-87E7-4ABEB1EA6761",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76DF7328-037B-4D75-BFF1-D22FE32D1F9D",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-16msc-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "674D3631-53DF-4E98-BC1E-C4122DF3F26A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A376430A-4F8E-4B91-83E4-C9D14A601C2E",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB472079-8ECF-44E2-969E-4FB5CF0E3971",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "055969EC-1F60-4F95-B686-535A71F5F496",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A7A8554-54A1-4B4C-A583-90FC0EC49A11",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "379BD1B2-68D5-4BB2-A816-DCB69183267D",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95E4FE31-0EC0-4034-8099-BCEC33E421ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A249EAAC-7B5C-4ADA-A5D1-E612D2F580F2",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-16mst-8tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6431F64E-9899-4F01-8814-1A92A36353C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "41C54026-899E-4D3C-8ECD-B9D1C6751B26",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D937271E-9E14-446A-B5DD-7B1E6D2B5C9C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0783C349-5E13-4B8E-BE92-DFB18DE31643",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE86A9B-1C3F-4208-A238-3E70031D3856",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "567BC006-28FB-44F2-A779-B4B8320F3A3B",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D9E901-A046-4CC2-A3E5-42E42EA3308C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C377E2E-43F1-4CDA-9386-074374EFD71C",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-20msc-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABF64C98-AF29-4C56-9E21-081E5DBE0B79",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83852BAA-F68C-4273-B822-25280EBE3D00",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F676041D-CF87-403D-9911-5B6DA9B21CC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B07BFA5-350C-401A-B063-B0322157784C",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECF8194D-BAA0-4F1F-AAC3-C5B96E4D0368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42E2DDC4-5EEE-459D-AAB4-18AC1573C5F6",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2C73920-8D86-4511-981D-944AD53965D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F8503F5-454C-4EB9-86DC-853CB7D3BF9C",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-20mst-4tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65AAE0BE-B955-428C-8DB3-EDC69D513B0A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86246FAC-8D36-41FE-85EC-9362D938A85B",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CCCFD34-9E11-4F33-AE7B-4F20F7B3A1C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F63B515-D60A-41C8-AD93-DBCE2440E6AD",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F36333F5-C4F5-4BB2-940C-88D9F886D398",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F703C1A8-E64A-4486-9F1A-11D0FF4EC5CE",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEA388CA-199C-487F-82F0-752FFA204286",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E7BA6AA-9EE5-46A8-AC4C-466A87159D95",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-8msc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "145A2735-5820-4060-80A0-51F3D7CABCCE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB462B54-F23B-4939-B9DF-2DFDE242C322",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8E6D37D-CD68-4E62-97BA-B6E87565C04F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2896256B-54D6-45EC-9F23-9D27ABD04FBD",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64A930B4-B043-4AF9-95E4-562AB65A9CDB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86638803-6014-4DE7-BBC9-26F2137368FF",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B29B0F1-0575-4EFF-9A45-6E86526A2C19",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C202168C-3666-4726-93A4-8AA0F910B322",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-8mst-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6711A4E5-F1D8-4C4E-BD2A-52FB66F670F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B0F7D65-7F08-4AFA-A30A-E29DCDFD49A7",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-hv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75ADE518-83D1-4275-8E55-5412238EFC86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DD1476B-B648-4EB7-A233-75FFDC4FCF1E",
"versionEndIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7528-8ssc-16tx-4gsfp-wv-wv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C689B536-4889-4BA1-AB29-ACE7C5DC952D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-f-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FADBEE27-6C34-4F1C-B1FF-FC90263D3CB8",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-f-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C91F7180-8FC6-4A74-B59E-D11E9AC529A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-f-24-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "748065CA-4349-48DC-96D9-0FB05F3BF098",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-f-24-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69EEDC14-3565-4808-9EC5-F27B201D48B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-f-24-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E768FF9-FAEB-44D1-95E5-8A416C934371",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-f-24-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEADBFB7-64EB-4E1B-86DB-364E2F0111D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-f-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E4C480A-5367-46C1-85A5-E3210E0C670A",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-f-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17BF3C14-D5BE-4369-867E-7DEE972FEC97",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-f-48-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "749457D9-5269-43C3-A6A2-F1DF27D87F1A",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-f-48-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ABB933B-A0CB-431E-A51D-EB630BFE92D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-f-48-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A526F2-8568-4088-87AF-B63D5063594B",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-f-48-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29F68ADA-AE16-4FFC-9374-2AFFBCCFBF57",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-f-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3695DC89-A027-49A6-A39E-77BDAE7A424E",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-f-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F572FA7-7520-4F5F-8398-42B3788C8B8A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-f-hv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD226E1F-DAE6-47B5-B5F3-46FAE2B7C2FD",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-f-hv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9B389AF-83A2-4A35-96BE-7971B1B3E4FD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-r-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "238EAECC-E3A2-426B-9A5A-9F48D985B322",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-r-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08EF9BFC-B45B-4F5E-8745-B335EFE638A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-r-24-24_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A07EA3C4-2722-43B4-9AD7-EFCD92BDCED8",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-r-24-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F88B615C-BE6A-4B1C-95A7-5B37796159C4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-r-24-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5058559A-1141-4B2C-AD06-58DD3E590C56",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-r-24-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D507239-F351-4DA0-80D0-96ACB9419EC7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-r-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9018404B-910F-4247-AB18-CA644A052FEE",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-r-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91198EE7-4205-478E-B7A8-987F977AD82C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-r-48-48_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "189D5ACC-D0F2-428B-A90C-2FA39D6D6C20",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-r-48-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02DA7C0A-2F37-461D-AFA8-BF73C653F47E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-r-48-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "41D304A9-E038-44F4-A139-896A51DB25A5",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-r-48-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EA7D60F-4670-4AAE-8A31-89C60A38EA43",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-r-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33B8C349-4B07-4172-A629-4C0FBDE943A2",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-r-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "392DB5FC-65AA-4E08-8E9F-AA66F6135078",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:pt-7828-r-hv-hv_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8F1E348-4C0F-420B-9275-2D5257D6E8BA",
"versionEndIncluding": "3.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:pt-7828-r-hv-hv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC4F8DC4-26C0-4D82-A7B6-8285158A1F21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code."
},
{
"lang": "es",
"value": "En Moxa la serie PT-7528 firmware, versiones 4.0 o inferiores y la serie PT-7828 firmware, versiones 3.9 o inferiores, un desbordamiento del b\u00fafer en el servidor web permite a atacantes remotos causar una condici\u00f3n de denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario."
}
],
"id": "CVE-2020-6989",
"lastModified": "2024-11-21T05:36:26.670",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-03-24T19:15:21.400",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-056-03"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.