CVE-2016-9369

An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/85965 Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*

Information

Published : 2017-02-13 13:59

Updated : 2017-02-17 10:12


NVD link : CVE-2016-9369

Mitre link : CVE-2016-9369


JSON object : View

CWE
CWE-287

Improper Authentication

Advertisement

dedicated server usa

Products Affected

moxa

  • nport_5450a1-m12
  • nport_5250a1-m12-t
  • nport_6150
  • nport_5210
  • nport_5200a_series_firmware
  • nport_5450a1-m12-ct
  • nport_5610-8-dtl
  • nport_5450-t
  • nport_5450a1-m12-t
  • nport_5630
  • nport_5150a1-m12-t
  • nport_5600-8-dtl_series_firmware
  • nport_5130
  • nport_5150
  • nport_5430
  • nport_5650
  • nport_5450a1-m12-ct-t
  • nport_5130a
  • nport_6150-t
  • nport_5610
  • nport_5100a_series_firmware
  • nport_5150a
  • nport_p5110a
  • nport_5232i
  • nport_5200_series_firmware
  • nport_5150a1-m12-ct
  • nport_5450i-t
  • nport_5250a1-m12-ct-t
  • nport_5430i
  • nport_5450i
  • nport_5650-8-dtl
  • nport_5150a1-m12
  • nport_5230
  • nport_5450
  • nport_5250a1-m12
  • nport_5250a
  • nport_5x50a1-m12_series_firmware
  • nport_5210a
  • nport_5410
  • nport_5150a1-m12-ct-t
  • nport_5230a
  • nport_5100_series_firmware
  • nport_5250a1-m12-ct
  • nport_5110a
  • nport_p5150a_series_firmware
  • nport_5650i-8-dtl
  • nport_6100_series_firmware
  • nport_5232
  • nport_5400_series_firmware
  • nport_5600_series_firmware
  • nport_5110