Show plain JSON{"containers": {"cna": {"affected": [{"platforms": ["NA"], "product": "MGate MB3180 Series", "vendor": "Moxa", "versions": [{"lessThan": "2.2", "status": "affected", "version": "all", "versionType": "custom"}]}, {"platforms": ["NA"], "product": "MGate MB3280 Series", "vendor": "Moxa", "versions": [{"status": "affected", "version": "all 4.1"}]}, {"platforms": ["NA"], "product": "MGate MB3480 Series", "vendor": "Moxa", "versions": [{"status": "affected", "version": "all 3.2"}]}], "credits": [{"lang": "en", "value": "Parul Sindhwad, Anurag M. Chevendra, and Dr. Faruk Kazi of CoE-CNDS Lab; VJTI; and Mumbai-INDIA reported this vulnerability to Moxa."}], "datePublic": "2021-12-23T00:00:00", "descriptions": [{"lang": "en", "value": "The affected products contain vulnerable firmware, which could allow an attacker to sniff the traffic and decrypt login credential details. This could give an attacker admin rights through the HTTP web server."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-319", "description": "CWE-319 Cleartext Transmission of Sensitive Information", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2021-12-27T18:48:19", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-357-01"}], "solutions": [{"lang": "en", "value": "Moxa has developed the following mitigations to address this vulnerability.\n\nEnable \u2018HTTPS\u2019 and disable the HTTP console function under \u2018Console Settings\u2019\nMoxa also recommends users refer to Tech Note: Moxa Security Hardening Guide for MGate MB3000 Series"}], "source": {"advisory": "ICSA-21-357-01", "discovery": "UNKNOWN"}, "title": "ICSA-21-357-01 Moxa MGate Protocol Gateways", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2021-12-23T23:05:00.000Z", "ID": "CVE-2021-4161", "STATE": "PUBLIC", "TITLE": "ICSA-21-357-01 Moxa MGate Protocol Gateways"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "MGate MB3180 Series", "version": {"version_data": [{"platform": "NA", "version_affected": "<", "version_name": "all", "version_value": "2.2"}]}}, {"product_name": "MGate MB3280 Series", "version": {"version_data": [{"platform": "NA", "version_name": "all", "version_value": "4.1"}]}}, {"product_name": "MGate MB3480 Series", "version": {"version_data": [{"platform": "NA", "version_name": "all", "version_value": "3.2"}]}}]}, "vendor_name": "Moxa"}]}}, "credit": [{"lang": "eng", "value": "Parul Sindhwad, Anurag M. Chevendra, and Dr. Faruk Kazi of CoE-CNDS Lab; VJTI; and Mumbai-INDIA reported this vulnerability to Moxa."}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "The affected products contain vulnerable firmware, which could allow an attacker to sniff the traffic and decrypt login credential details. This could give an attacker admin rights through the HTTP web server."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-319 Cleartext Transmission of Sensitive Information"}]}]}, "references": {"reference_data": [{"name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-357-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-357-01"}]}, "solution": [{"lang": "en", "value": "Moxa has developed the following mitigations to address this vulnerability.\n\nEnable \u2018HTTPS\u2019 and disable the HTTP console function under \u2018Console Settings\u2019\nMoxa also recommends users refer to Tech Note: Moxa Security Hardening Guide for MGate MB3000 Series"}], "source": {"advisory": "ICSA-21-357-01", "discovery": "UNKNOWN"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T17:16:04.411Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-357-01"}]}]}, "cveMetadata": {"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-4161", "datePublished": "2021-12-27T18:48:19.982800Z", "dateReserved": "2021-12-23T00:00:00", "dateUpdated": "2024-09-16T19:24:13.483Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}