6.5
CVE-2023-5962
- EPSS 0.07%
- Veröffentlicht 23.12.2023 09:15:08
- Zuletzt bearbeitet 21.11.2024 08:42:52
- Quelle psirt@moxa.com
- CVE-Watchlists
- Unerledigt
A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Moxa ≫ Iologik E1210 Firmware Version < 3.3
Moxa ≫ Iologik E1211 Firmware Version < 3.3
Moxa ≫ Iologik E1212 Firmware Version < 3.3
Moxa ≫ Iologik E1213 Firmware Version < 3.3
Moxa ≫ Iologik E1214 Firmware Version < 3.3
Moxa ≫ Iologik E1240 Firmware Version < 3.3
Moxa ≫ Iologik E1241 Firmware Version < 3.3
Moxa ≫ Iologik E1242 Firmware Version < 3.3
Moxa ≫ Iologik E1260 Firmware Version < 3.3
Moxa ≫ Iologik E1262 Firmware Version < 3.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.213 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| psirt@moxa.com | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
The product uses a broken or risky cryptographic algorithm or protocol.
CWE-328 Use of Weak Hash
The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack).