ID

VAR-201702-0071


CVE

CVE-2016-8362


TITLE

plural Moxa OnCell Vulnerability in downloading log files in series products

Trust: 0.8

sources: JVNDB: JVNDB-2016-007996

DESCRIPTION

An issue was discovered in Moxa OnCell OnCellG3470A-LTE, AWK-1131A/3131A/4131A Series, AWK-3191 Series, AWK-5232/6232 Series, AWK-1121/1127 Series, WAC-1001 V2 Series, WAC-2004 Series, AWK-3121-M12-RTG Series, AWK-3131-M12-RCC Series, AWK-5232-M12-RCC Series, TAP-6226 Series, AWK-3121/4121 Series, AWK-3131/4131 Series, and AWK-5222/6222 Series. Any user is able to download log files by accessing a specific URL. MOXAOnCell is an industrial grade IP gateway product. The MoxaOnCellSeries product verification bypass vulnerability allows an attacker to bypass the authentication mechanism and gain unauthorized access. Moxa OnCell Series products are prone to an authentication-bypass vulnerability and an OS command execution vulnerability. Moxa OnCellG3470A-LTE etc

Trust: 2.61

sources: NVD: CVE-2016-8362 // JVNDB: JVNDB-2016-007996 // CNVD: CNVD-2016-10731 // BID: 94092 // VULHUB: VHN-97182 // VULMON: CVE-2016-8362

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['network device']sub_category:LTE device

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2016-10731

AFFECTED PRODUCTS

vendor:moxamodel:oncellg3470a-ltescope: - version: -

Trust: 1.4

vendor:moxamodel:awk-3131ascope:lteversion:10-31-2016

Trust: 1.0

vendor:moxamodel:awk-3191scope:lteversion:05-30-2017

Trust: 1.0

vendor:moxamodel:wac-1001 v2scope:lteversion:06-29-2017

Trust: 1.0

vendor:moxamodel:awk-1131ascope:lteversion:10-31-2016

Trust: 1.0

vendor:moxamodel:awk-1121scope:lteversion:06-29-2017

Trust: 1.0

vendor:moxamodel:awk-5232-m12-rccscope:lteversion:06-29-2017

Trust: 1.0

vendor:moxamodel:awk-1127scope:lteversion:06-29-2017

Trust: 1.0

vendor:moxamodel:wac-2004scope:lteversion:06-29-2017

Trust: 1.0

vendor:moxamodel:awk-4131ascope:lteversion:10-31-2016

Trust: 1.0

vendor:moxamodel:oncellg3470a-ltescope:lteversion:10-31-2016

Trust: 1.0

vendor:moxamodel:awk-5232scope:lteversion:05-30-2017

Trust: 1.0

vendor:moxamodel:awk-3131-m12-rccscope:lteversion:06-29-2017

Trust: 1.0

vendor:moxamodel:awk-6232scope:lteversion:05-30-2017

Trust: 1.0

vendor:moxamodel:awk-3121-m12-rtgscope:lteversion:06-29-2017

Trust: 1.0

vendor:moxamodel:awk-1121scope: - version: -

Trust: 0.8

vendor:moxamodel:awk-1127scope: - version: -

Trust: 0.8

vendor:moxamodel:awk-1131ascope: - version: -

Trust: 0.8

vendor:moxamodel:awk-3121-m12-rtgscope: - version: -

Trust: 0.8

vendor:moxamodel:awk-3131-m12-rccscope: - version: -

Trust: 0.8

vendor:moxamodel:awk-3131ascope: - version: -

Trust: 0.8

vendor:moxamodel:awk-3191scope: - version: -

Trust: 0.8

vendor:moxamodel:awk-4131ascope: - version: -

Trust: 0.8

vendor:moxamodel:awk-5232scope: - version: -

Trust: 0.8

vendor:moxamodel:awk-5232-m12-rccscope: - version: -

Trust: 0.8

vendor:moxamodel:awk-6232scope: - version: -

Trust: 0.8

vendor:moxamodel:wac-1001 v2scope: - version: -

Trust: 0.8

vendor:moxamodel:wac-2004scope: - version: -

Trust: 0.8

vendor:moxamodel:awk-5222/6222 seriesscope: - version: -

Trust: 0.6

vendor:moxamodel:awk-3131/4131 seriesscope: - version: -

Trust: 0.6

vendor:moxamodel:awk-3121/4121 seriesscope: - version: -

Trust: 0.6

vendor:moxamodel:tap-6226 seriesscope: - version: -

Trust: 0.6

vendor:moxamodel:awk-5232-m12-rcc seriesscope: - version: -

Trust: 0.6

vendor:moxamodel:awk-3131-m12-rcc seriesscope: - version: -

Trust: 0.6

vendor:moxamodel:awk-3121-m12-rtg seriesscope: - version: -

Trust: 0.6

vendor:moxamodel:wac-2004 seriesscope: - version: -

Trust: 0.6

vendor:moxamodel:wac-1001 seriesscope:eqversion:v2

Trust: 0.6

vendor:moxamodel:awk-1121/1127 seriesscope: - version: -

Trust: 0.6

vendor:moxamodel:awk-5232/6232 seriesscope: - version: -

Trust: 0.6

vendor:moxamodel:awk-3191 seriesscope: - version: -

Trust: 0.6

vendor:moxamodel:awk-1131a/3131a/4131a seriesscope: - version: -

Trust: 0.6

vendor:moxamodel:awk-1131ascope:eqversion:10-31-2016

Trust: 0.6

vendor:moxamodel:awk-6232scope:eqversion:05-30-2017

Trust: 0.6

vendor:moxamodel:oncellg3470a-ltescope:eqversion:10-31-2016

Trust: 0.6

vendor:moxamodel:awk-5232scope:eqversion:05-30-2017

Trust: 0.6

vendor:moxamodel:awk-5232-m12-rccscope:eqversion:06-29-2017

Trust: 0.6

vendor:moxamodel:awk-4131ascope:eqversion:10-31-2016

Trust: 0.6

vendor:moxamodel:awk-3131ascope:eqversion:10-31-2016

Trust: 0.6

vendor:moxamodel:awk-1121scope:eqversion:06-29-2017

Trust: 0.6

vendor:moxamodel:awk-3131-m12-rccscope:eqversion:06-29-2017

Trust: 0.6

vendor:moxamodel:awk-3191scope:eqversion:05-30-2017

Trust: 0.6

vendor:moxamodel:wac-2004scope:eqversion:0

Trust: 0.3

vendor:moxamodel:wac-1001scope:eqversion:v20

Trust: 0.3

vendor:moxamodel:tap-6226scope:eqversion:0

Trust: 0.3

vendor:moxamodel:oncellg3470a-ltescope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-6232scope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-6222scope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-5232-m12-rccscope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-5232scope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-5222scope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-4131ascope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-4131scope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-4121scope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-3191scope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-3131ascope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-3131-m12-rccscope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-3131scope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-3121-m12-rtgscope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-3121scope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-1131ascope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-1127scope:eqversion:0

Trust: 0.3

vendor:moxamodel:awk-1121scope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2016-10731 // BID: 94092 // JVNDB: JVNDB-2016-007996 // CNNVD: CNNVD-201611-108 // NVD: CVE-2016-8362

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-8362
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-8362
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-10731
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201611-108
value: MEDIUM

Trust: 0.6

VULHUB: VHN-97182
value: MEDIUM

Trust: 0.1

VULMON: CVE-2016-8362
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-8362
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-10731
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-97182
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-8362
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-10731 // VULHUB: VHN-97182 // VULMON: CVE-2016-8362 // JVNDB: JVNDB-2016-007996 // CNNVD: CNNVD-201611-108 // NVD: CVE-2016-8362

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-97182 // JVNDB: JVNDB-2016-007996 // NVD: CVE-2016-8362

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201611-108

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201611-108

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-007996

PATCH

title:Top Pageurl:http://www.moxa.com/

Trust: 0.8

title:MoxaOnCellSeries product verification patch to bypass vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/83636

Trust: 0.6

title:Moxa OnCell Series product authentication bypass vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65334

Trust: 0.6

title:Moxa OnCell Series product authentication bypass vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65481

Trust: 0.6

sources: CNVD: CNVD-2016-10731 // JVNDB: JVNDB-2016-007996 // CNNVD: CNNVD-201611-108

EXTERNAL IDS

db:NVDid:CVE-2016-8362

Trust: 3.6

db:ICS CERTid:ICSA-16-308-01

Trust: 2.9

db:BIDid:94092

Trust: 2.7

db:JVNDBid:JVNDB-2016-007996

Trust: 0.8

db:CNNVDid:CNNVD-201611-108

Trust: 0.7

db:CNVDid:CNVD-2016-10731

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULHUBid:VHN-97182

Trust: 0.1

db:VULMONid:CVE-2016-8362

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2016-10731 // VULHUB: VHN-97182 // VULMON: CVE-2016-8362 // BID: 94092 // JVNDB: JVNDB-2016-007996 // CNNVD: CNNVD-201611-108 // NVD: CVE-2016-8362

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-308-01

Trust: 3.0

url:http://www.securityfocus.com/bid/94092

Trust: 2.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8362

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-8362

Trust: 0.8

url:http://www.moxa.com/

Trust: 0.3

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2016-10731 // VULHUB: VHN-97182 // VULMON: CVE-2016-8362 // BID: 94092 // JVNDB: JVNDB-2016-007996 // CNNVD: CNNVD-201611-108 // NVD: CVE-2016-8362

CREDITS

Maxim Rupp

Trust: 0.9

sources: BID: 94092 // CNNVD: CNNVD-201611-108

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2016-10731
db:VULHUBid:VHN-97182
db:VULMONid:CVE-2016-8362
db:BIDid:94092
db:JVNDBid:JVNDB-2016-007996
db:CNNVDid:CNNVD-201611-108
db:NVDid:CVE-2016-8362

LAST UPDATE DATE

2025-04-20T20:47:21.301000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-10731date:2016-11-08T00:00:00
db:VULHUBid:VHN-97182date:2017-03-16T00:00:00
db:VULMONid:CVE-2016-8362date:2017-03-16T00:00:00
db:BIDid:94092date:2016-11-24T01:07:00
db:JVNDBid:JVNDB-2016-007996date:2017-04-06T00:00:00
db:CNNVDid:CNNVD-201611-108date:2016-11-08T00:00:00
db:NVDid:CVE-2016-8362date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-10731date:2016-11-08T00:00:00
db:VULHUBid:VHN-97182date:2017-02-13T00:00:00
db:VULMONid:CVE-2016-8362date:2017-02-13T00:00:00
db:BIDid:94092date:2016-11-03T00:00:00
db:JVNDBid:JVNDB-2016-007996date:2017-04-06T00:00:00
db:CNNVDid:CNNVD-201611-108date:2016-11-08T00:00:00
db:NVDid:CVE-2016-8362date:2017-02-13T21:59:01.050