ID

VAR-201711-0918


CVE

CVE-2017-13703


TITLE

MOXA EDS-G512E Vulnerability related to input validation on devices

Trust: 0.8

sources: JVNDB: JVNDB-2017-010004

DESCRIPTION

An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. A denial of service may occur. MOXA EDS-G512E The device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. MoxaEDS-G512E is an Ethernet switch device from Moxa. A security vulnerability exists in the MOXAEDS-G512E5.1build 16072215 release

Trust: 2.25

sources: NVD: CVE-2017-13703 // JVNDB: JVNDB-2017-010004 // CNVD: CNVD-2017-37435 // VULHUB: VHN-104352

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-37435

AFFECTED PRODUCTS

vendor:moxamodel:eds-g512escope:eqversion:5.1

Trust: 1.6

vendor:moxamodel:eds-g512escope:eqversion:5.1 build 16072215

Trust: 0.8

vendor:moxamodel:eds-g512e buildscope:eqversion:5.116072215

Trust: 0.6

sources: CNVD: CNVD-2017-37435 // JVNDB: JVNDB-2017-010004 // CNNVD: CNNVD-201708-1116 // NVD: CVE-2017-13703

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-13703
value: HIGH

Trust: 1.0

NVD: CVE-2017-13703
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-37435
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201708-1116
value: HIGH

Trust: 0.6

VULHUB: VHN-104352
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-13703
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-37435
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-104352
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-13703
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-37435 // VULHUB: VHN-104352 // JVNDB: JVNDB-2017-010004 // CNNVD: CNNVD-201708-1116 // NVD: CVE-2017-13703

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-104352 // JVNDB: JVNDB-2017-010004 // NVD: CVE-2017-13703

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201708-1116

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201708-1116

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-010004

PATCH

title:EDS-G508E/EDS-G512E/EDS-G516E Seriesurl:https://www.moxa.com/product/EDS-G500E.htm

Trust: 0.8

title:MOXAEDS-G512E patch for denial of service vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/110941

Trust: 0.6

sources: CNVD: CNVD-2017-37435 // JVNDB: JVNDB-2017-010004

EXTERNAL IDS

db:NVDid:CVE-2017-13703

Trust: 3.1

db:JVNDBid:JVNDB-2017-010004

Trust: 0.8

db:CNNVDid:CNNVD-201708-1116

Trust: 0.7

db:CNVDid:CNVD-2017-37435

Trust: 0.6

db:VULHUBid:VHN-104352

Trust: 0.1

sources: CNVD: CNVD-2017-37435 // VULHUB: VHN-104352 // JVNDB: JVNDB-2017-010004 // CNNVD: CNNVD-201708-1116 // NVD: CVE-2017-13703

REFERENCES

url:https://www.sentryo.net/fr/sentryo-analyse-switch-industriel/

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-13703

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13703

Trust: 0.8

url:https://www.sentryo.net/sentryo-analysis-industrial-ethernet-switch/

Trust: 0.8

sources: CNVD: CNVD-2017-37435 // VULHUB: VHN-104352 // JVNDB: JVNDB-2017-010004 // CNNVD: CNNVD-201708-1116 // NVD: CVE-2017-13703

SOURCES

db:CNVDid:CNVD-2017-37435
db:VULHUBid:VHN-104352
db:JVNDBid:JVNDB-2017-010004
db:CNNVDid:CNNVD-201708-1116
db:NVDid:CVE-2017-13703

LAST UPDATE DATE

2024-11-23T22:00:48.932000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-37435date:2017-12-19T00:00:00
db:VULHUBid:VHN-104352date:2017-11-29T00:00:00
db:JVNDBid:JVNDB-2017-010004date:2017-11-30T00:00:00
db:CNNVDid:CNNVD-201708-1116date:2017-11-21T00:00:00
db:NVDid:CVE-2017-13703date:2024-11-21T03:11:28.220

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-37435date:2017-12-19T00:00:00
db:VULHUBid:VHN-104352date:2017-11-17T00:00:00
db:JVNDBid:JVNDB-2017-010004date:2017-11-30T00:00:00
db:CNNVDid:CNNVD-201708-1116date:2017-08-28T00:00:00
db:NVDid:CVE-2017-13703date:2017-11-17T18:29:00.497