Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_MOXA_CVE-2016-9348.NASL
HistoryAug 02, 2023 - 12:00 a.m.

Moxa NPort Plain Text Storage of Passwords (CVE-2016-9348)

2023-08-0200:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
10
moxa nport
plaintext storage
passwords
vulnerability
security issue
tenable.ot
configuration file
plain text
cve-2016-9348
information security document

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

EPSS

0

Percentile

10.4%

An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. A configuration file contains parameters that represent passwords in plaintext.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(501552);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/08/03");

  script_cve_id("CVE-2016-9348");

  script_name(english:"Moxa NPort Plain Text Storage of Passwords (CVE-2016-9348)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"An issue was discovered in Moxa NPort 5110 versions prior to 2.6,
NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series
versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort
5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A
versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort
5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series
versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2,
NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series
versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11,
NPort IA5450A versions prior to v1.4. A configuration file contains
parameters that represent passwords in plaintext.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-9348");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(255);

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/02/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/02/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/08/02");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5110_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5130_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5150_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5150ai-m12_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5100a_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_p5150a_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5200_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5200a_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5250ai-m12_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5400_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5450ai-m12_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5600_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5600-8-dt_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5600-8-dtl_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_6000_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_6100_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_6110_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_ia5450a_series_firmware");
  script_set_attribute(attribute:"generated_plugin", value:"former");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Moxa");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Moxa');

var asset = tenable_ot::assets::get(vendor:'Moxa');

var vuln_cpes = {
    "cpe:/o:moxa:nport_5110_series_firmware" :
        {"versionEndExcluding" : "2.7", "family" : "NPort"},
    "cpe:/o:moxa:nport_5130_series_firmware" :
        {"versionEndExcluding" : "3.7", "family" : "NPort"},
    "cpe:/o:moxa:nport_5150_series_firmware" :
        {"versionEndExcluding" : "3.7", "family" : "NPort"},
    "cpe:/o:moxa:nport_5150ai-m12_series_firmware" :
        {"versionEndExcluding" : "1.3", "family" : "NPort"},
    "cpe:/o:moxa:nport_5100a_series_firmware" :
        {"versionEndExcluding" : "1.4", "family" : "NPort"},
    "cpe:/o:moxa:nport_p5150a_firmware" :
        {"versionEndExcluding" : "1.4", "family" : "NPort"},
    "cpe:/o:moxa:nport_5200_series_firmware" :
        {"versionEndExcluding" : "2.9", "family" : "NPort"},
    "cpe:/o:moxa:nport_5200a_series_firmware" :
        {"versionEndExcluding" : "1.4", "family" : "NPort"},
    "cpe:/o:moxa:nport_5250ai-m12_series_firmware" :
        {"versionEndExcluding" : "1.3", "family" : "NPort"},
    "cpe:/o:moxa:nport_5400_series_firmware" :
        {"versionEndExcluding" : "3.12", "family" : "NPort"},
    "cpe:/o:moxa:nport_5450ai-m12_series_firmware" :
        {"versionEndExcluding" : "1.3", "family" : "NPort"},
    "cpe:/o:moxa:nport_5600_series_firmware" :
        {"versionEndExcluding" : "3.8", "family" : "MoxaNPort5600"},
    "cpe:/o:moxa:nport_5600-8-dt_series_firmware" :
        {"versionEndExcluding" : "2.5", "family" : "MoxaNPort5600"},
    "cpe:/o:moxa:nport_5600-8-dtl_series_firmware" :
        {"versionEndExcluding" : "2.5", "family" : "MoxaNPort5600"},
    "cpe:/o:moxa:nport_6000_series_firmware" :
        {"versionEndExcluding" : "2.7", "family" : "NPort"},
    "cpe:/o:moxa:nport_6100_series_firmware" :
        {"versionEndExcluding" : "1.16", "family" : "NPort"},
    "cpe:/o:moxa:nport_6110_series_firmware" :
        {"family" : "NPort"},
    "cpe:/o:moxa:nport_ia5450a_series_firmware" :
        {"versionEndExcluding" : "1.4", "family" : "NPort"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_NOTE);

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

EPSS

0

Percentile

10.4%

Related for TENABLE_OT_MOXA_CVE-2016-9348.NASL