ID

VAR-201903-0178


CVE

CVE-2019-6524


TITLE

Moxa IKS and EDS Authentication vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-002346

DESCRIPTION

Moxa IKS and EDS do not implement sufficient measures to prevent multiple failed authentication attempts, which may allow an attacker to discover passwords via brute force attack. Moxa IKS and EDS Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MoxaIKS and EDS are Moxa's line of industrial switches. MoxaIKS and EDS series have excessive certification attempts to limit the vulnerability. An attacker can exploit the vulnerability to discover passwords through brute force attacks. Moxa IKS and EDS are prone to following security vulnerabilities: 1. A cross-site-scripting vulnerability 2. Multiple stack-based buffer-overflow vulnerabilities 3. A security vulnerability 4. An information disclosure vulnerability 5. A cross-site request-forgery vulnerability 6. Multiple denial-of-service vulnerabilities 7. A security-bypass vulnerability 8. An authentication bypass vulnerability An attacker may leverage these issues to view arbitrary files within the context of the web server, execute arbitrary script code in the browser of the victim in the context of the affected site, steal cookie-based authentication credentials, gain access to sensitive information, compromise the application, access or modify data, reboot or crash of the application resulting in a denial of service condition, bypass security restrictions, or execute arbitrary code. This may lead to other vulnerabilities. The following Moxa products and versions are affected: IKS-G6824A series versions 4.5 and prior, EDS-405A series versions 3.8 and prior, EDS-408A series versions 3.8 and prior, and EDS-510A series versions 3.8 and prior. Moxa IKS-G6824A series are all products of Moxa Company in Taiwan, China. IKS-G6824A series is a series of rack-mount Ethernet switches. EDS-405A series is an EDS-405A series Ethernet switch. EDS-408A series is an EDS-408A series Ethernet switch. A security vulnerability exists in several Moxa products due to the program not adequately limiting the number of authentication requests

Trust: 2.79

sources: NVD: CVE-2019-6524 // JVNDB: JVNDB-2019-002346 // CNVD: CNVD-2019-06054 // BID: 107178 // IVD: 1b1fb0ed-df65-4062-818e-9ac627102377 // VULHUB: VHN-157959 // VULMON: CVE-2019-6524

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: 1b1fb0ed-df65-4062-818e-9ac627102377 // CNVD: CNVD-2019-06054

AFFECTED PRODUCTS

vendor:moxamodel:iks-g6824ascope:lteversion:4.5

Trust: 1.0

vendor:moxamodel:eds-510ascope:lteversion:3.8

Trust: 1.0

vendor:moxamodel:eds-405ascope:lteversion:3.8

Trust: 1.0

vendor:moxamodel:eds-408ascope:lteversion:3.8

Trust: 1.0

vendor:moxamodel:eds-405a seriesscope: - version: -

Trust: 0.8

vendor:moxamodel:eds-408a seriesscope: - version: -

Trust: 0.8

vendor:moxamodel:eds-510a seriesscope: - version: -

Trust: 0.8

vendor:moxamodel:iks-g6824a seriesscope: - version: -

Trust: 0.8

vendor:moxamodel:iks-g6824ascope:lteversion:<=4.5

Trust: 0.6

vendor:moxamodel:eds-405ascope:lteversion:<=3.8

Trust: 0.6

vendor:moxamodel:eds-408ascope:lteversion:<=3.8

Trust: 0.6

vendor:moxamodel:eds-510ascope:lteversion:<=3.8

Trust: 0.6

vendor:moxamodel:iks-g6824ascope:eqversion:4.5

Trust: 0.3

vendor:moxamodel:eds-510ascope:eqversion:3.8

Trust: 0.3

vendor:moxamodel:eds-408ascope:eqversion:3.8

Trust: 0.3

vendor:moxamodel:eds-405ascope:eqversion:3.8

Trust: 0.3

vendor:iks g6824amodel: - scope:eqversion:*

Trust: 0.2

vendor:eds 405amodel: - scope:eqversion:*

Trust: 0.2

vendor:eds 408amodel: - scope:eqversion:*

Trust: 0.2

vendor:eds 510amodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 1b1fb0ed-df65-4062-818e-9ac627102377 // CNVD: CNVD-2019-06054 // BID: 107178 // JVNDB: JVNDB-2019-002346 // NVD: CVE-2019-6524

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6524
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-6524
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-06054
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201902-955
value: CRITICAL

Trust: 0.6

IVD: 1b1fb0ed-df65-4062-818e-9ac627102377
value: CRITICAL

Trust: 0.2

VULHUB: VHN-157959
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-6524
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-6524
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-06054
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 1b1fb0ed-df65-4062-818e-9ac627102377
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-157959
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-6524
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-6524
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 1b1fb0ed-df65-4062-818e-9ac627102377 // CNVD: CNVD-2019-06054 // VULHUB: VHN-157959 // VULMON: CVE-2019-6524 // JVNDB: JVNDB-2019-002346 // CNNVD: CNNVD-201902-955 // NVD: CVE-2019-6524

PROBLEMTYPE DATA

problemtype:CWE-307

Trust: 1.1

problemtype:CWE-287

Trust: 0.9

sources: VULHUB: VHN-157959 // JVNDB: JVNDB-2019-002346 // NVD: CVE-2019-6524

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201902-955

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201902-955

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-002346

PATCH

title:Top Pageurl:https://www.moxa.com/

Trust: 0.8

title:MoxaIKS and EDS over-certification attempts to improperly limit the patchurl:https://www.cnvd.org.cn/patchInfo/show/155125

Trust: 0.6

title:Multiple Moxa Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89672

Trust: 0.6

sources: CNVD: CNVD-2019-06054 // JVNDB: JVNDB-2019-002346 // CNNVD: CNNVD-201902-955

EXTERNAL IDS

db:NVDid:CVE-2019-6524

Trust: 3.7

db:ICS CERTid:ICSA-19-057-01

Trust: 3.5

db:BIDid:107178

Trust: 2.1

db:CNNVDid:CNNVD-201902-955

Trust: 0.9

db:CNVDid:CNVD-2019-06054

Trust: 0.8

db:JVNDBid:JVNDB-2019-002346

Trust: 0.8

db:AUSCERTid:ESB-2019.0597

Trust: 0.6

db:IVDid:1B1FB0ED-DF65-4062-818E-9AC627102377

Trust: 0.2

db:VULHUBid:VHN-157959

Trust: 0.1

db:VULMONid:CVE-2019-6524

Trust: 0.1

sources: IVD: 1b1fb0ed-df65-4062-818e-9ac627102377 // CNVD: CNVD-2019-06054 // VULHUB: VHN-157959 // VULMON: CVE-2019-6524 // BID: 107178 // JVNDB: JVNDB-2019-002346 // CNNVD: CNNVD-201902-955 // NVD: CVE-2019-6524

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-19-057-01

Trust: 3.6

url:http://www.securityfocus.com/bid/107178

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-6524

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6524

Trust: 0.8

url:https://www.us-cert.gov/ics/advisories/icsa-19-057-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76138

Trust: 0.6

url:http://www.moxastore.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/307.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2019-06054 // VULHUB: VHN-157959 // VULMON: CVE-2019-6524 // BID: 107178 // JVNDB: JVNDB-2019-002346 // CNNVD: CNNVD-201902-955 // NVD: CVE-2019-6524

CREDITS

Ivan B, Sergey Fedonin, and Vyacheslav Moskvin of Positive Technologies Security reported these vulnerabilities to NCCIC.

Trust: 0.6

sources: CNNVD: CNNVD-201902-955

SOURCES

db:IVDid:1b1fb0ed-df65-4062-818e-9ac627102377
db:CNVDid:CNVD-2019-06054
db:VULHUBid:VHN-157959
db:VULMONid:CVE-2019-6524
db:BIDid:107178
db:JVNDBid:JVNDB-2019-002346
db:CNNVDid:CNNVD-201902-955
db:NVDid:CVE-2019-6524

LAST UPDATE DATE

2024-11-23T21:52:28.121000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-06054date:2019-03-04T00:00:00
db:VULHUBid:VHN-157959date:2020-10-19T00:00:00
db:VULMONid:CVE-2019-6524date:2020-10-19T00:00:00
db:BIDid:107178date:2019-02-26T00:00:00
db:JVNDBid:JVNDB-2019-002346date:2019-04-08T00:00:00
db:CNNVDid:CNNVD-201902-955date:2020-10-20T00:00:00
db:NVDid:CVE-2019-6524date:2024-11-21T04:46:37.530

SOURCES RELEASE DATE

db:IVDid:1b1fb0ed-df65-4062-818e-9ac627102377date:2019-03-04T00:00:00
db:CNVDid:CNVD-2019-06054date:2019-03-04T00:00:00
db:VULHUBid:VHN-157959date:2019-03-05T00:00:00
db:VULMONid:CVE-2019-6524date:2019-03-05T00:00:00
db:BIDid:107178date:2019-02-26T00:00:00
db:JVNDBid:JVNDB-2019-002346date:2019-04-08T00:00:00
db:CNNVDid:CNNVD-201902-955date:2019-02-26T00:00:00
db:NVDid:CVE-2019-6524date:2019-03-05T20:29:00.357