CVE-2023-4204 – NPort IAW5000A-I/O Series Hardcoded Credential Vulnerability
https://notcve.org/view.php?id=CVE-2023-4204
NPort IAW5000A-I/O Series firmware version v2.2 and prior is affected by a hardcoded credential vulnerabilitywhich poses a potential risk to the security and integrity of the affected device. This vulnerability is attributed to the presence of a hardcoded key, which could potentially facilitate firmware manipulation. La versión de firmware 2.2 y anteriores de la serie NPort IAW5000A-I/O se ve afectada por una vulnerabilidad de credencial codificada que representa un riesgo potencial para la seguridad y la integridad del dispositivo afectado. Esta vulnerabilidad se atribuye a la presencia de una clave codificada, que podría facilitar la manipulación del firmware. • https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230304-nport-iaw5000a-i-o-series-hardcoded-credential-vulnerability • CWE-798: Use of Hard-coded Credentials •
CVE-2023-3336 – TN-5900 Series User Enumeration Vulnerability
https://notcve.org/view.php?id=CVE-2023-3336
TN-5900 Series version 3.3 and prior versions is vulnearble to user enumeration vulnerability. The vulnerability may allow a remote attacker to determine whether a user is valid during password recovery through the web login page and enable a brute force attack with valid users. • https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230401-tn-5900-series-user-enumeration-vulnerability • CWE-203: Observable Discrepancy CWE-204: Observable Response Discrepancy •
CVE-2023-33236 – MXsecurity Hardcoded Credential Vulnerability
https://notcve.org/view.php?id=CVE-2023-33236
MXsecurity version 1.0 is vulnearble to hardcoded credential vulnerability. This vulnerability has been reported that can be exploited to craft arbitrary JWT tokens and subsequently bypass authentication for web-based APIs. This vulnerability allows remote attackers to bypass authentication on affected installations of Moxa MXsecurity Series appliances. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the web-based interface. The issue results from a hardcoded JWT secret within the application configuration. • https://www.moxa.com/en/support/product-support/security-advisory/mxsecurity-command-injection-and-hardcoded-credential-vulnerabilities • CWE-798: Use of Hard-coded Credentials •
CVE-2023-33235 – MXsecurity Command Injection Vulnerability
https://notcve.org/view.php?id=CVE-2023-33235
MXsecurity version 1.0 is vulnearble to command injection vulnerability. This vulnerability has been reported in the SSH CLI program, which can be exploited by attackers who have gained authorization privileges. The attackers can break out of the restricted shell and subsequently execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Moxa MXsecurity Series appliances. Authentication is required to exploit this vulnerability. The specific flaw exists within the SSH CLI program. • https://www.moxa.com/en/support/product-support/security-advisory/mxsecurity-command-injection-and-hardcoded-credential-vulnerabilities • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2023-28697 – Moxa MiiNePort E1 - Broken Access Control
https://notcve.org/view.php?id=CVE-2023-28697
Moxa MiiNePort E1 has a vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to perform arbitrary system operation or disrupt service. • https://cdn-cms.azureedge.net/Moxa/media/PDIM/S100000223/MiiNePort%20E1%20Series_moxa-miineport-e1-series-firmware-v1.9.rom_Software%20Release%20History.pdf https://www.twcert.org.tw/tw/cp-132-7021-eb43a-1.html • CWE-306: Missing Authentication for Critical Function •