ID

VAR-201603-0046


CVE

CVE-2016-2282


TITLE

Moxa ioLogik E2200 Device and ioAdmin Configuration Utility Vulnerabilities in which related plaintext is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2016-001695

DESCRIPTION

Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly encrypt credentials, which makes it easier for remote attackers to obtain the associated cleartext via unspecified vectors. Moxa's ioLogik E2200 and ioAdmin Configuration Utility are products of Moxa. The former is an Ethernet RTU (Remote Terminal Control System) controller, which is a set of software for managing and configuring the ioLogik E2200. A security vulnerability exists in Moxa's ioLogik E2200 version prior to 3.12 and in versions prior to ioAdmin Configuration Utility 3.18. The vulnerability stems from the program failing to encrypt the certificate. A remote attacker can exploit this vulnerability to obtain relevant plaintext data. Moxa ioLogik E2210 is a smart Ethernet I / O product from Moxa. There is a security vulnerability in Moxa ioLogik E2210. Attackers can use this vulnerability to obtain sensitive information and unauthorized access rights, implement replay attacks, and perform unauthorized operations. This may aid in further attacks

Trust: 3.24

sources: NVD: CVE-2016-2282 // JVNDB: JVNDB-2016-001695 // CNVD: CNVD-2016-01474 // CNNVD: CNNVD-201508-383 // BID: 76330 // IVD: 5f0a9b4e-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-91101

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 5f0a9b4e-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-01474

AFFECTED PRODUCTS

vendor:moxamodel:ioadminscope:lteversion:3.17

Trust: 1.0

vendor:moxamodel:iologikscope:lteversion:3.11

Trust: 1.0

vendor:moxamodel:ioadminscope:ltversion:3.18

Trust: 0.8

vendor:moxamodel:iologik e2210scope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2210-tscope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2212scope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2212-tscope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2214scope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2214-tscope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2240scope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2240-tscope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2242scope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2242-tscope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2260scope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2260-tscope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2262scope: - version: -

Trust: 0.8

vendor:moxamodel:iologik e2262-tscope: - version: -

Trust: 0.8

vendor:moxamodel:iologikscope:ltversion:3.12

Trust: 0.8

vendor:moxamodel:iologik e2200scope:ltversion:3.12

Trust: 0.6

vendor:moxamodel:ioadmin configuration utilityscope:ltversion:3.18

Trust: 0.6

vendor:moxamodel:iologikscope:eqversion:3.11

Trust: 0.6

vendor:moxamodel:ioadminscope:eqversion:3.17

Trust: 0.6

vendor:ioadminmodel: - scope:eqversion:*

Trust: 0.2

vendor:iologikmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 5f0a9b4e-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-01474 // JVNDB: JVNDB-2016-001695 // CNNVD: CNNVD-201603-030 // NVD: CVE-2016-2282

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-2282
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-2282
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-01474
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201603-030
value: MEDIUM

Trust: 0.6

IVD: 5f0a9b4e-2351-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-91101
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-2282
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-01474
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 5f0a9b4e-2351-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-91101
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-2282
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.0

sources: IVD: 5f0a9b4e-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-01474 // VULHUB: VHN-91101 // JVNDB: JVNDB-2016-001695 // CNNVD: CNNVD-201603-030 // NVD: CVE-2016-2282

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-91101 // JVNDB: JVNDB-2016-001695 // NVD: CVE-2016-2282

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201603-030

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201603-030

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001695

PATCH

title:トップページurl:http://japan.moxa.com/

Trust: 0.8

title:Moxa ioLogik E2200 and ioAdmin Configuration Utility information disclosure vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/72311

Trust: 0.6

title:Moxa ioLogik E2200 and ioAdmin Configuration Utility Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60391

Trust: 0.6

sources: CNVD: CNVD-2016-01474 // JVNDB: JVNDB-2016-001695 // CNNVD: CNNVD-201603-030

EXTERNAL IDS

db:NVDid:CVE-2016-2282

Trust: 3.6

db:ICS CERTid:ICSA-16-063-01

Trust: 3.4

db:CNNVDid:CNNVD-201603-030

Trust: 0.9

db:BIDid:76330

Trust: 0.9

db:CNVDid:CNVD-2016-01474

Trust: 0.8

db:JVNDBid:JVNDB-2016-001695

Trust: 0.8

db:CNNVDid:CNNVD-201508-383

Trust: 0.6

db:ICS CERT ALERTid:ICS-ALERT-15-224-04

Trust: 0.3

db:IVDid:5F0A9B4E-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-91101

Trust: 0.1

sources: IVD: 5f0a9b4e-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-01474 // VULHUB: VHN-91101 // BID: 76330 // JVNDB: JVNDB-2016-001695 // CNNVD: CNNVD-201508-383 // CNNVD: CNNVD-201603-030 // NVD: CVE-2016-2282

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-063-01

Trust: 3.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2282

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2282

Trust: 0.8

url:http://www.securityfocus.com/bid/76330

Trust: 0.6

url:https://ics-cert.us-cert.gov/alerts/ics-alert-15-224-04

Trust: 0.3

url:http://store.moxa.com/a/product/iologik-e2210-series?id=m20090324001

Trust: 0.3

sources: CNVD: CNVD-2016-01474 // VULHUB: VHN-91101 // BID: 76330 // JVNDB: JVNDB-2016-001695 // CNNVD: CNNVD-201508-383 // CNNVD: CNNVD-201603-030 // NVD: CVE-2016-2282

CREDITS

Aditya K. Sood

Trust: 0.9

sources: BID: 76330 // CNNVD: CNNVD-201508-383

SOURCES

db:IVDid:5f0a9b4e-2351-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2016-01474
db:VULHUBid:VHN-91101
db:BIDid:76330
db:JVNDBid:JVNDB-2016-001695
db:CNNVDid:CNNVD-201508-383
db:CNNVDid:CNNVD-201603-030
db:NVDid:CVE-2016-2282

LAST UPDATE DATE

2025-04-12T22:58:22.340000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-01474date:2016-03-08T00:00:00
db:VULHUBid:VHN-91101date:2016-03-14T00:00:00
db:BIDid:76330date:2016-07-06T13:34:00
db:JVNDBid:JVNDB-2016-001695date:2016-03-15T00:00:00
db:CNNVDid:CNNVD-201508-383date:2015-08-18T00:00:00
db:CNNVDid:CNNVD-201603-030date:2021-05-20T00:00:00
db:NVDid:CVE-2016-2282date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:5f0a9b4e-2351-11e6-abef-000c29c66e3ddate:2016-03-08T00:00:00
db:CNVDid:CNVD-2016-01474date:2016-03-08T00:00:00
db:VULHUBid:VHN-91101date:2016-03-04T00:00:00
db:BIDid:76330date:2015-08-12T00:00:00
db:JVNDBid:JVNDB-2016-001695date:2016-03-15T00:00:00
db:CNNVDid:CNNVD-201508-383date:2015-08-18T00:00:00
db:CNNVDid:CNNVD-201603-030date:2016-03-04T00:00:00
db:NVDid:CVE-2016-2282date:2016-03-04T15:59:02.407