6.5

CVE-2023-5962

A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MoxaIologik E1210 Firmware Version < 3.3
   MoxaIologik E1210 Version-
MoxaIologik E1211 Firmware Version < 3.3
   MoxaIologik E1211 Version-
MoxaIologik E1212 Firmware Version < 3.3
   MoxaIologik E1212 Version-
MoxaIologik E1213 Firmware Version < 3.3
   MoxaIologik E1213 Version-
MoxaIologik E1214 Firmware Version < 3.3
   MoxaIologik E1214 Version-
MoxaIologik E1240 Firmware Version < 3.3
   MoxaIologik E1240 Version-
MoxaIologik E1241 Firmware Version < 3.3
   MoxaIologik E1241 Version-
MoxaIologik E1242 Firmware Version < 3.3
   MoxaIologik E1242 Version-
MoxaIologik E1260 Firmware Version < 3.3
   MoxaIologik E1260 Version-
MoxaIologik E1262 Firmware Version < 3.3
   MoxaIologik E1262 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.213
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
psirt@moxa.com 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE-327 Use of a Broken or Risky Cryptographic Algorithm

The product uses a broken or risky cryptographic algorithm or protocol.

CWE-328 Use of Weak Hash

The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack).