CVE-2023-4929 – NPort 5000 Series Firmware Improper Validation of Integrity Check Vulnerability
https://notcve.org/view.php?id=CVE-2023-4929
All firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices. Todas las versiones de firmware de la serie NPort 5000 se ven afectadas por una vulnerabilidad de validación inadecuada de verificación de integridad. Esta vulnerabilidad se debe a comprobaciones insuficientes de las actualizaciones o mejoras del firmware, lo que potencialmente permite que usuarios malintencionados manipulen el firmware y obtengan el control de los dispositivos. • https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability • CWE-354: Improper Validation of Integrity Check Value •
CVE-2020-27185
https://notcve.org/view.php?id=CVE-2020-27185
Cleartext transmission of sensitive information via Moxa Service in NPort IA5000A series serial devices. Successfully exploiting the vulnerability could enable attackers to read authentication data, device configuration, and other sensitive data transmitted over Moxa Service. Una transmisión de texto sin cifrar de información confidencial por medio del servicio Moxa en los dispositivos seriales de la serie NPort IA5000A. Una explotación con éxito de la vulnerabilidad podría permitir a los atacantes leer datos de autenticación, la configuración del dispositivo y otros datos confidenciales transmitidos mediante el Servicio Moxa • https://ics-cert.kaspersky.com/advisories/klcert-advisories/2021/05/11/klcert-20-021%2C https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2020-27184
https://notcve.org/view.php?id=CVE-2020-27184
The NPort IA5000A Series devices use Telnet as one of the network device management services. Telnet does not support the encryption of client-server communications, making it vulnerable to Man-in-the-Middle attacks. Los dispositivos de la serie NPort IA5000A usan Telnet como uno de los servicios de administración de dispositivos de red. Telnet no soporta el cifrado de las comunicaciones cliente-servidor, haciéndolo vulnerable a ataques de tipo Man-in-the-Middle • https://ics-cert.kaspersky.com/advisories/klcert-advisories/2021/05/11/klcert-20-020%2C https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2020-27150
https://notcve.org/view.php?id=CVE-2020-27150
In multiple versions of NPort IA5000A Series, the result of exporting a device’s configuration contains the passwords of all users on the system and other sensitive data in the original form if “Pre-shared key” doesn’t set. En múltiples versiones de la Serie NPort IA5000A, el resultado de exportar la configuración de un dispositivo contiene las contraseñas de todos los usuarios del sistema y otros datos confidenciales en el formato original si no es ajustado "Pre-shared key" • https://ics-cert.kaspersky.com/advisories/klcert-advisories/2021/05/11/klcert-20-019%2C https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities •
CVE-2020-27149
https://notcve.org/view.php?id=CVE-2020-27149
By exploiting a vulnerability in NPort IA5150A/IA5250A Series before version 1.5, a user with “Read Only” privilege level can send requests via the web console to have the device’s configuration changed. Al explotar una vulnerabilidad en la Serie NPort IA5150A/IA5250A versiones anteriores a 1.5, un usuario con nivel de privilegio "Read Only" puede enviar peticiones mediante la consola web para cambiar la configuración del dispositivo • https://ics-cert.kaspersky.com/advisories/klcert-advisories/2021/05/11/klcert-20-018%2C https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities •