ID

VAR-201904-1553


CVE

CVE-2019-6526


TITLE

plural Moxa Vulnerabilities related to certificate and password management in products

Trust: 0.8

sources: JVNDB: JVNDB-2019-003395

DESCRIPTION

Moxa IKS-G6824A series Versions 4.5 and prior, EDS-405A series Version 3.8 and prior, EDS-408A series Version 3.8 and prior, and EDS-510A series Version 3.8 and prior use plaintext transmission of sensitive data, which may allow an attacker to capture sensitive data such as an administrative password. plural Moxa There are vulnerabilities related to certificate and password management and encryption in the product.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MoxaIKS and EDS are Moxa's line of industrial switches. MoxaIKS and EDS series lack sensitive data for encryption holes. The vulnerability stems from the fact that these devices transmit sensitive data in clear text. An attacker could exploit this vulnerability to capture sensitive data such as administrative passwords. Moxa IKS and EDS are prone to following security vulnerabilities: 1. A cross-site-scripting vulnerability 2. Multiple stack-based buffer-overflow vulnerabilities 3. A security vulnerability 4. An information disclosure vulnerability 5. A cross-site request-forgery vulnerability 6. Multiple denial-of-service vulnerabilities 7. A security-bypass vulnerability 8. An authentication bypass vulnerability An attacker may leverage these issues to view arbitrary files within the context of the web server, execute arbitrary script code in the browser of the victim in the context of the affected site, steal cookie-based authentication credentials, gain access to sensitive information, compromise the application, access or modify data, reboot or crash of the application resulting in a denial of service condition, bypass security restrictions, or execute arbitrary code. This may lead to other vulnerabilities. Moxa IKS-G6824A series are all products of Moxa Company in Taiwan, China. IKS-G6824A series is a series of rack-mount Ethernet switches. EDS-405A series is an EDS-405A series Ethernet switch. EDS-408A series is an EDS-408A series Ethernet switch. Encryption issues exist in several Moxa products. The vulnerability stems from incorrect use of relevant cryptographic algorithms by network systems or products, resulting in improperly encrypted content, weak encryption, and storing sensitive information in plain text

Trust: 2.79

sources: NVD: CVE-2019-6526 // JVNDB: JVNDB-2019-003395 // CNVD: CNVD-2019-06055 // BID: 107178 // IVD: 08b8f9fe-72ad-4d47-bf81-c57b81a839e4 // VULHUB: VHN-157961 // VULMON: CVE-2019-6526

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: 08b8f9fe-72ad-4d47-bf81-c57b81a839e4 // CNVD: CNVD-2019-06055

AFFECTED PRODUCTS

vendor:moxamodel:iks-g6824ascope:lteversion:4.5

Trust: 1.0

vendor:moxamodel:eds-510ascope:lteversion:3.8

Trust: 1.0

vendor:moxamodel:eds-405ascope:lteversion:3.8

Trust: 1.0

vendor:moxamodel:eds-408ascope:lteversion:3.8

Trust: 1.0

vendor:moxamodel:eds-405a seriesscope:lteversion:3.8

Trust: 0.8

vendor:moxamodel:eds-408a seriesscope:lteversion:3.8

Trust: 0.8

vendor:moxamodel:eds-510a seriesscope:lteversion:3.8

Trust: 0.8

vendor:moxamodel:iks-g6824a seriesscope:lteversion:4.5

Trust: 0.8

vendor:moxamodel:iks-g6824ascope:lteversion:<=4.5

Trust: 0.6

vendor:moxamodel:eds-405ascope:lteversion:<=3.8

Trust: 0.6

vendor:moxamodel:eds-408ascope:lteversion:<=3.8

Trust: 0.6

vendor:moxamodel:eds-510ascope:lteversion:<=3.8

Trust: 0.6

vendor:moxamodel:iks-g6824ascope:eqversion:4.5

Trust: 0.3

vendor:moxamodel:eds-510ascope:eqversion:3.8

Trust: 0.3

vendor:moxamodel:eds-408ascope:eqversion:3.8

Trust: 0.3

vendor:moxamodel:eds-405ascope:eqversion:3.8

Trust: 0.3

vendor:iks g6824amodel: - scope:eqversion:*

Trust: 0.2

vendor:eds 405amodel: - scope:eqversion:*

Trust: 0.2

vendor:eds 408amodel: - scope:eqversion:*

Trust: 0.2

vendor:eds 510amodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 08b8f9fe-72ad-4d47-bf81-c57b81a839e4 // CNVD: CNVD-2019-06055 // BID: 107178 // JVNDB: JVNDB-2019-003395 // NVD: CVE-2019-6526

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6526
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-6526
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-06055
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201902-953
value: CRITICAL

Trust: 0.6

IVD: 08b8f9fe-72ad-4d47-bf81-c57b81a839e4
value: CRITICAL

Trust: 0.2

VULHUB: VHN-157961
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-6526
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-6526
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-06055
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 08b8f9fe-72ad-4d47-bf81-c57b81a839e4
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-157961
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-6526
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-6526
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 08b8f9fe-72ad-4d47-bf81-c57b81a839e4 // CNVD: CNVD-2019-06055 // VULHUB: VHN-157961 // VULMON: CVE-2019-6526 // JVNDB: JVNDB-2019-003395 // CNNVD: CNNVD-201902-953 // NVD: CVE-2019-6526

PROBLEMTYPE DATA

problemtype:CWE-319

Trust: 1.1

problemtype:CWE-311

Trust: 1.0

problemtype:CWE-255

Trust: 0.9

problemtype:CWE-310

Trust: 0.9

sources: VULHUB: VHN-157961 // JVNDB: JVNDB-2019-003395 // NVD: CVE-2019-6526

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201902-953

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201902-953

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-003395

PATCH

title:Top Pageurl:https://www.moxa.com/en/

Trust: 0.8

title:MoxaIKS and EDS sensitive data lack patches for encryption vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/155123

Trust: 0.6

title:Multiple Moxa Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89670

Trust: 0.6

sources: CNVD: CNVD-2019-06055 // JVNDB: JVNDB-2019-003395 // CNNVD: CNNVD-201902-953

EXTERNAL IDS

db:NVDid:CVE-2019-6526

Trust: 3.7

db:ICS CERTid:ICSA-19-057-01

Trust: 3.5

db:CNNVDid:CNNVD-201902-953

Trust: 0.9

db:BIDid:107178

Trust: 0.9

db:CNVDid:CNVD-2019-06055

Trust: 0.8

db:JVNDBid:JVNDB-2019-003395

Trust: 0.8

db:AUSCERTid:ESB-2019.0597

Trust: 0.6

db:IVDid:08B8F9FE-72AD-4D47-BF81-C57B81A839E4

Trust: 0.2

db:VULHUBid:VHN-157961

Trust: 0.1

db:VULMONid:CVE-2019-6526

Trust: 0.1

sources: IVD: 08b8f9fe-72ad-4d47-bf81-c57b81a839e4 // CNVD: CNVD-2019-06055 // VULHUB: VHN-157961 // VULMON: CVE-2019-6526 // BID: 107178 // JVNDB: JVNDB-2019-003395 // CNNVD: CNNVD-201902-953 // NVD: CVE-2019-6526

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-19-057-01

Trust: 3.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-6526

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6526

Trust: 0.8

url:https://www.us-cert.gov/ics/advisories/icsa-19-057-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76138

Trust: 0.6

url:http://www.securityfocus.com/bid/107178

Trust: 0.6

url:http://www.moxastore.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/319.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2019-06055 // VULHUB: VHN-157961 // VULMON: CVE-2019-6526 // BID: 107178 // JVNDB: JVNDB-2019-003395 // CNNVD: CNNVD-201902-953 // NVD: CVE-2019-6526

CREDITS

and Vyacheslav Moskvin of Positive Technologies Security,Ivan B, Sergey Fedonin, and Vyacheslav Moskvin of Positive Technologies Security reported these vulnerabilities to NCCIC.

Trust: 0.6

sources: CNNVD: CNNVD-201902-953

SOURCES

db:IVDid:08b8f9fe-72ad-4d47-bf81-c57b81a839e4
db:CNVDid:CNVD-2019-06055
db:VULHUBid:VHN-157961
db:VULMONid:CVE-2019-6526
db:BIDid:107178
db:JVNDBid:JVNDB-2019-003395
db:CNNVDid:CNNVD-201902-953
db:NVDid:CVE-2019-6526

LAST UPDATE DATE

2024-11-23T21:52:28.222000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-06055date:2019-03-04T00:00:00
db:VULHUBid:VHN-157961date:2021-11-03T00:00:00
db:VULMONid:CVE-2019-6526date:2021-11-03T00:00:00
db:BIDid:107178date:2019-02-26T00:00:00
db:JVNDBid:JVNDB-2019-003395date:2019-05-16T00:00:00
db:CNNVDid:CNNVD-201902-953date:2021-11-04T00:00:00
db:NVDid:CVE-2019-6526date:2024-11-21T04:46:37.790

SOURCES RELEASE DATE

db:IVDid:08b8f9fe-72ad-4d47-bf81-c57b81a839e4date:2019-03-04T00:00:00
db:CNVDid:CNVD-2019-06055date:2019-03-04T00:00:00
db:VULHUBid:VHN-157961date:2019-04-15T00:00:00
db:VULMONid:CVE-2019-6526date:2019-04-15T00:00:00
db:BIDid:107178date:2019-02-26T00:00:00
db:JVNDBid:JVNDB-2019-003395date:2019-05-16T00:00:00
db:CNNVDid:CNNVD-201902-953date:2019-02-26T00:00:00
db:NVDid:CVE-2019-6526date:2019-04-15T12:31:42.447