ID

VAR-201702-0295


CVE

CVE-2016-8346


TITLE

Moxa EDR-810 Vulnerability with elevated privileges in industrial secure routers

Trust: 0.8

sources: JVNDB: JVNDB-2016-007682

DESCRIPTION

An issue was discovered in Moxa EDR-810 Industrial Secure Router. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access configuration and log files (PRIVILEGE ESCALATION). The MoxaEDR-810 router has a remote privilege escalation vulnerability that can be exploited by an attacker to gain unauthorized access. Versions prior to Moxa EDR-810 3.13 are vulnerable

Trust: 2.52

sources: NVD: CVE-2016-8346 // JVNDB: JVNDB-2016-007682 // CNVD: CNVD-2016-10276 // BID: 93800 // VULHUB: VHN-97166

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-10276

AFFECTED PRODUCTS

vendor:moxamodel:edr-810scope:lteversion:3.12

Trust: 1.0

vendor:moxamodel:edr-810scope: - version: -

Trust: 0.8

vendor:moxamodel:edr-810 seriesscope:ltversion:3.13

Trust: 0.8

vendor:moxamodel:edr-810 routerscope:eqversion:3.13

Trust: 0.6

vendor:moxamodel:edr-810scope:eqversion:3.12

Trust: 0.6

vendor:moxamodel:edr-810scope:eqversion:0

Trust: 0.3

vendor:moxamodel:edr-810scope:neversion:3.13

Trust: 0.3

sources: CNVD: CNVD-2016-10276 // BID: 93800 // JVNDB: JVNDB-2016-007682 // CNNVD: CNNVD-201610-668 // NVD: CVE-2016-8346

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-8346
value: HIGH

Trust: 1.0

NVD: CVE-2016-8346
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-10276
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201610-668
value: MEDIUM

Trust: 0.6

VULHUB: VHN-97166
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-8346
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-10276
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-97166
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-8346
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-10276 // VULHUB: VHN-97166 // JVNDB: JVNDB-2016-007682 // CNNVD: CNNVD-201610-668 // NVD: CVE-2016-8346

PROBLEMTYPE DATA

problemtype:CWE-532

Trust: 1.9

sources: VULHUB: VHN-97166 // JVNDB: JVNDB-2016-007682 // NVD: CVE-2016-8346

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-668

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201610-668

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-007682

PATCH

title:EDR-810シリーズurl:http://japan.moxa.com/product/EDR-810.htm

Trust: 0.8

title:MoxaEDR-810 Router Privilege Escalation Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/83162

Trust: 0.6

title:Moxa EDR-810 Router Remedial measures for remote privilege escalationurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64979

Trust: 0.6

sources: CNVD: CNVD-2016-10276 // JVNDB: JVNDB-2016-007682 // CNNVD: CNNVD-201610-668

EXTERNAL IDS

db:NVDid:CVE-2016-8346

Trust: 3.4

db:ICS CERTid:ICSA-16-294-01

Trust: 2.8

db:BIDid:93800

Trust: 2.6

db:JVNDBid:JVNDB-2016-007682

Trust: 0.8

db:CNNVDid:CNNVD-201610-668

Trust: 0.7

db:CNVDid:CNVD-2016-10276

Trust: 0.6

db:VULHUBid:VHN-97166

Trust: 0.1

sources: CNVD: CNVD-2016-10276 // VULHUB: VHN-97166 // BID: 93800 // JVNDB: JVNDB-2016-007682 // CNNVD: CNNVD-201610-668 // NVD: CVE-2016-8346

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-294-01

Trust: 2.8

url:http://www.securityfocus.com/bid/93800

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8346

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8346

Trust: 0.8

url:http://www.securityfocus.com/bid/93800/info

Trust: 0.6

url:http://www.moxa.com/

Trust: 0.3

sources: CNVD: CNVD-2016-10276 // VULHUB: VHN-97166 // BID: 93800 // JVNDB: JVNDB-2016-007682 // CNNVD: CNNVD-201610-668 // NVD: CVE-2016-8346

CREDITS

Maxim Rupp

Trust: 0.9

sources: BID: 93800 // CNNVD: CNNVD-201610-668

SOURCES

db:CNVDid:CNVD-2016-10276
db:VULHUBid:VHN-97166
db:BIDid:93800
db:JVNDBid:JVNDB-2016-007682
db:CNNVDid:CNNVD-201610-668
db:NVDid:CVE-2016-8346

LAST UPDATE DATE

2024-11-23T22:26:52.816000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-10276date:2016-10-28T00:00:00
db:VULHUBid:VHN-97166date:2017-02-23T00:00:00
db:BIDid:93800date:2016-10-26T01:16:00
db:JVNDBid:JVNDB-2016-007682date:2017-03-10T00:00:00
db:CNNVDid:CNNVD-201610-668date:2016-10-21T00:00:00
db:NVDid:CVE-2016-8346date:2024-11-21T02:59:11.750

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-10276date:2016-10-28T00:00:00
db:VULHUBid:VHN-97166date:2017-02-13T00:00:00
db:BIDid:93800date:2016-10-20T00:00:00
db:JVNDBid:JVNDB-2016-007682date:2017-03-10T00:00:00
db:CNNVDid:CNNVD-201610-668date:2016-10-21T00:00:00
db:NVDid:CVE-2016-8346date:2017-02-13T21:59:00.643