{"id": "CVE-2023-5961", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "psirt@moxa.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2023-12-23T09:15:07.730", "references": [{"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-235250-iologik-e1200-series-web-server-vulnerability", "tags": ["Vendor Advisory"], "source": "psirt@moxa.com"}, {"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-235250-iologik-e1200-series-web-server-vulnerability", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "psirt@moxa.com", "description": [{"lang": "en", "value": "CWE-352"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "A Cross-Site Request Forgery (CSRF) vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. An attacker can exploit this vulnerability to trick a client into making an unintentional request to the web server, which will be treated as an authentic request. This vulnerability may lead an attacker to perform operations on behalf of the victimized user.\n\n"}, {"lang": "es", "value": "Se identific\u00f3 una vulnerabilidad de Cross-Site Request Forgery (CSRF) en las versiones de firmware de la serie ioLogik E1200 v3.3 y anteriores. Un atacante puede aprovechar esta vulnerabilidad para enga\u00f1ar a un cliente para que realice una solicitud no intencionada al servidor web, que ser\u00e1 tratada como una solicitud aut\u00e9ntica. Esta vulnerabilidad puede llevar a un atacante a realizar operaciones en nombre del usuario v\u00edctima."}], "lastModified": "2024-11-21T08:42:52.213", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1210_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF14969B-6E9F-4553-96EB-7BE6C5834260", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1210:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "67DDCD42-10D5-46B2-AB91-66EF30D5D645"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1211_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D03FA4E2-4A30-4ED9-BA4D-5546FC0BA939", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1211:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "308E46FB-488A-4907-9A69-AACDE23A3394"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1212_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA133D93-4A1D-419A-92C5-C0C0A35187B5", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1212:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "616E5D0B-0D3A-4808-8C15-2FDC35E8605C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1213_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E39755B-9625-4D95-B425-BD28B60180CA", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1213:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9AAE4F4E-779C-401F-A75E-AC66757DD313"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1214_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F59B517D-63C4-4FE5-A89F-B2A235E8239A", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1214:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A0837606-60F7-4563-8F80-AE7C1CC3F469"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1240_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90601A69-F749-4E68-A034-74B9F046436F", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1240:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "77A9D90D-0419-410C-AF65-0FFE0FF2882F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1241_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38280BA6-C262-45AC-AD33-813523F64DAB", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1241:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3239D045-8A7C-4407-B77C-E82C178D8B90"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1242_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB237801-4287-4A30-8CE8-DB90FAB5C118", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1242:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5D40DF4C-0EA9-44B0-8D8C-D1FC2AB5A357"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1260_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACDAE3E7-675E-44BF-BD57-BF5C31B969A5", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1260:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B0B4FA04-BF84-4B8A-A295-0312A3790F2E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:moxa:iologik_e1262_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "485CCB1F-A642-48B2-A8AD-4A7EBB5791BD", "versionEndExcluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:moxa:iologik_e1262:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3366C39B-50FD-497B-A6A1-875CEB8913C5"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "psirt@moxa.com"}