Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00077.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Moxa
Subscribe
|
Nport 6150
Subscribe
Nport 6150-t
Subscribe
Nport 6150-t Firmware
Subscribe
Nport 6150 Firmware
Subscribe
Nport 6250
Subscribe
Nport 6250-m-sc
Subscribe
Nport 6250-m-sc-t
Subscribe
Nport 6250-m-sc-t Firmware
Subscribe
Nport 6250-m-sc Firmware
Subscribe
Nport 6250-s-sc
Subscribe
Nport 6250-s-sc-t
Subscribe
Nport 6250-s-sc-t Firmware
Subscribe
Nport 6250-s-sc Firmware
Subscribe
Nport 6250-t
Subscribe
Nport 6250-t Firmware
Subscribe
Nport 6250 Firmware
Subscribe
Nport 6450
Subscribe
Nport 6450-t
Subscribe
Nport 6450-t Firmware
Subscribe
Nport 6450 Firmware
Subscribe
Nport 6610-16
Subscribe
Nport 6610-16-48v
Subscribe
Nport 6610-16-48v Firmware
Subscribe
Nport 6610-16 Firmware
Subscribe
Nport 6610-32
Subscribe
Nport 6610-32-48v
Subscribe
Nport 6610-32-48v Firmware
Subscribe
Nport 6610-32 Firmware
Subscribe
Nport 6610-8
Subscribe
Nport 6610-8-48v
Subscribe
Nport 6610-8-48v Firmware
Subscribe
Nport 6610-8 Firmware
Subscribe
Nport 6650-16
Subscribe
Nport 6650-16-48v
Subscribe
Nport 6650-16-48v Firmware
Subscribe
Nport 6650-16-hv-t
Subscribe
Nport 6650-16-hv-t Firmware
Subscribe
Nport 6650-16-t
Subscribe
Nport 6650-16-t Firmware
Subscribe
Nport 6650-16 Firmware
Subscribe
Nport 6650-32
Subscribe
Nport 6650-32-48v
Subscribe
Nport 6650-32-48v Firmware
Subscribe
Nport 6650-32-hv-t
Subscribe
Nport 6650-32-hv-t Firmware
Subscribe
Nport 6650-32 Firmware
Subscribe
Nport 6650-8
Subscribe
Nport 6650-8-48v
Subscribe
Nport 6650-8-48v Firmware
Subscribe
Nport 6650-8-hv-t
Subscribe
Nport 6650-8-hv-t Firmware
Subscribe
Nport 6650-8-t
Subscribe
Nport 6650-8-t Firmware
Subscribe
Nport 6650-8 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-57920 | A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service. |
Solution
The vulnerability has been addressed in FWR v2.0 and subsequent versions; it does NOT exist in these firmware versions. For the users still using version v1.x, refer to the Hardening Guide https://www.moxa.com/en/products/industrial-edge-connectivity/serial-device-servers/terminal-servers/nport-6100-6200-series#resources on Moxa’s website to: * Upgrade to the newest firmware version. * Disable the HTTP console.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2024-09-05T15:45:44.046Z
Reserved: 2023-10-18T00:52:37.461Z
Link: CVE-2023-5627
Updated: 2024-08-02T08:07:32.397Z
Status : Modified
Published: 2023-11-01T16:15:08.790
Modified: 2024-11-21T08:42:08.887
Link: CVE-2023-5627
No data.
OpenCVE Enrichment
No data.
EUVD