ID

VAR-201712-0120


CVE

CVE-2017-16727


TITLE

Moxa NPort W2150A and W2250A Unauthorized Access Vulnerability

Trust: 0.8

sources: IVD: e2e0b980-39ab-11e9-8759-000c29342cb1 // CNVD: CNVD-2017-38102

DESCRIPTION

A Credentials Management issue was discovered in Moxa NPort W2150A versions prior to 1.11, and NPort W2250A versions prior to 1.11. The default password is empty on the device. An unauthorized user can access the device without a password. An unauthorized user has the ability to completely compromise the confidentiality and integrity of the wireless traffic. Moxa NPort W2150A and NPort W2250A Contains vulnerabilities related to certificate and password management.Information may be obtained and information may be altered. Moxa's NPortW2150A and NPortW2250A are both serial communication servers used by Moxa to connect industrial serial devices to the network. This may lead to further attacks

Trust: 2.61

sources: NVD: CVE-2017-16727 // JVNDB: JVNDB-2017-011707 // CNVD: CNVD-2017-38102 // BID: 102254 // IVD: e2e0b980-39ab-11e9-8759-000c29342cb1

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: e2e0b980-39ab-11e9-8759-000c29342cb1 // CNVD: CNVD-2017-38102

AFFECTED PRODUCTS

vendor:moxamodel:nport w2150ascope:ltversion:1.11

Trust: 2.4

vendor:moxamodel:nport w2250ascope:ltversion:1.11

Trust: 2.4

vendor:moxamodel:nport w2250ascope:eqversion:1.10

Trust: 0.3

vendor:moxamodel:nport w2150ascope:eqversion:1.10

Trust: 0.3

vendor:moxamodel:nport w2250ascope:neversion:1.11

Trust: 0.3

vendor:moxamodel:nport w2150ascope:neversion:1.11

Trust: 0.3

vendor:nport w2150amodel: - scope:eqversion:*

Trust: 0.2

vendor:nport w2250amodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: e2e0b980-39ab-11e9-8759-000c29342cb1 // CNVD: CNVD-2017-38102 // BID: 102254 // JVNDB: JVNDB-2017-011707 // NVD: CVE-2017-16727

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-16727
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-16727
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2017-38102
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201712-869
value: CRITICAL

Trust: 0.6

IVD: e2e0b980-39ab-11e9-8759-000c29342cb1
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2017-16727
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-38102
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2e0b980-39ab-11e9-8759-000c29342cb1
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-16727
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: IVD: e2e0b980-39ab-11e9-8759-000c29342cb1 // CNVD: CNVD-2017-38102 // JVNDB: JVNDB-2017-011707 // CNNVD: CNNVD-201712-869 // NVD: CVE-2017-16727

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.8

problemtype:CWE-521

Trust: 1.0

sources: JVNDB: JVNDB-2017-011707 // NVD: CVE-2017-16727

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201712-869

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201712-869

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011707

PATCH

title:Firmware for NPort W2x50A Seriesurl:https://www.moxa.com/support/download.aspx?type=support&id=14781

Trust: 0.8

title:MoxaNPortW2150AandW2250A Unauthorized Access Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/111725

Trust: 0.6

title:Moxa NPort W2150A and NPort W2250A Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=77318

Trust: 0.6

sources: CNVD: CNVD-2017-38102 // JVNDB: JVNDB-2017-011707 // CNNVD: CNNVD-201712-869

EXTERNAL IDS

db:NVDid:CVE-2017-16727

Trust: 3.5

db:ICS CERTid:ICSA-17-355-01

Trust: 2.7

db:BIDid:102254

Trust: 2.5

db:CNVDid:CNVD-2017-38102

Trust: 0.8

db:CNNVDid:CNNVD-201712-869

Trust: 0.8

db:JVNDBid:JVNDB-2017-011707

Trust: 0.8

db:IVDid:E2E0B980-39AB-11E9-8759-000C29342CB1

Trust: 0.2

sources: IVD: e2e0b980-39ab-11e9-8759-000c29342cb1 // CNVD: CNVD-2017-38102 // BID: 102254 // JVNDB: JVNDB-2017-011707 // CNNVD: CNNVD-201712-869 // NVD: CVE-2017-16727

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-355-01

Trust: 2.7

url:http://www.securityfocus.com/bid/102254

Trust: 2.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16727

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-16727

Trust: 0.8

url:https://www.moxa.com/

Trust: 0.3

sources: CNVD: CNVD-2017-38102 // BID: 102254 // JVNDB: JVNDB-2017-011707 // CNNVD: CNNVD-201712-869 // NVD: CVE-2017-16727

CREDITS

Federico Maggi

Trust: 0.3

sources: BID: 102254

SOURCES

db:IVDid:e2e0b980-39ab-11e9-8759-000c29342cb1
db:CNVDid:CNVD-2017-38102
db:BIDid:102254
db:JVNDBid:JVNDB-2017-011707
db:CNNVDid:CNNVD-201712-869
db:NVDid:CVE-2017-16727

LAST UPDATE DATE

2025-04-20T23:42:03.951000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-38102date:2017-12-26T00:00:00
db:BIDid:102254date:2017-12-21T00:00:00
db:JVNDBid:JVNDB-2017-011707date:2018-01-24T00:00:00
db:CNNVDid:CNNVD-201712-869date:2019-10-17T00:00:00
db:NVDid:CVE-2017-16727date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:e2e0b980-39ab-11e9-8759-000c29342cb1date:2017-12-26T00:00:00
db:CNVDid:CNVD-2017-38102date:2017-12-26T00:00:00
db:BIDid:102254date:2017-12-21T00:00:00
db:JVNDBid:JVNDB-2017-011707date:2018-01-24T00:00:00
db:CNNVDid:CNNVD-201712-869date:2017-12-25T00:00:00
db:NVDid:CVE-2017-16727date:2017-12-22T02:29:15.027