Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_MOXA_CVE-2016-9369.NASL
HistoryAug 02, 2023 - 12:00 a.m.

Moxa NPort Unauthenticated Firmware Update (CVE-2016-9369)

2023-08-0200:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
4
moxa nport
unauthenticated firmware update
cve-2016-9369
remote code execution
tenable.ot scanner

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.009 Low

EPSS

Percentile

82.8%

An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(501500);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/08/03");

  script_cve_id("CVE-2016-9369");

  script_name(english:"Moxa NPort Unauthenticated Firmware Update (CVE-2016-9369)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"An issue was discovered in Moxa NPort 5110 versions prior to 2.6,
NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series
versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort
5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A
versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort
5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series
versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2,
NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series
versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11,
NPort IA5450A versions prior to v1.4. Firmware can be updated over the
network without authentication, which may allow remote code execution.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/bid/85965");
  script_set_attribute(attribute:"see_also", value:"https://ics-cert.us-cert.gov/advisories/ICSA-16-336-02");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-9369");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(287);

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/02/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/02/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/08/02");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5110_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5130_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5150_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5150ai-m12_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5100a_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_p5150a_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5200_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5200a_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5250ai-m12_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5400_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5450ai-m12_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5600_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5600-8-dt_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_5600-8-dtl_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_6000_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_6100_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_6110_series_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:nport_ia5450a_series_firmware");
  script_set_attribute(attribute:"generated_plugin", value:"former");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Moxa");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Moxa');

var asset = tenable_ot::assets::get(vendor:'Moxa');

var vuln_cpes = {
    "cpe:/o:moxa:nport_5110_series_firmware" :
        {"versionEndExcluding" : "2.7", "family" : "NPort"},
    "cpe:/o:moxa:nport_5130_series_firmware" :
        {"versionEndExcluding" : "3.7", "family" : "NPort"},
    "cpe:/o:moxa:nport_5150_series_firmware" :
        {"versionEndExcluding" : "3.7", "family" : "NPort"},
    "cpe:/o:moxa:nport_5150ai-m12_series_firmware" :
        {"versionEndExcluding" : "1.3", "family" : "NPort"},
    "cpe:/o:moxa:nport_5100a_series_firmware" :
        {"versionEndExcluding" : "1.4", "family" : "NPort"},
    "cpe:/o:moxa:nport_p5150a_firmware" :
        {"versionEndExcluding" : "1.4", "family" : "NPort"},
    "cpe:/o:moxa:nport_5200_series_firmware" :
        {"versionEndExcluding" : "2.9", "family" : "NPort"},
    "cpe:/o:moxa:nport_5200a_series_firmware" :
        {"versionEndExcluding" : "1.4", "family" : "NPort"},
    "cpe:/o:moxa:nport_5250ai-m12_series_firmware" :
        {"versionEndExcluding" : "1.3", "family" : "NPort"},
    "cpe:/o:moxa:nport_5400_series_firmware" :
        {"versionEndExcluding" : "3.12", "family" : "NPort"},
    "cpe:/o:moxa:nport_5450ai-m12_series_firmware" :
        {"versionEndExcluding" : "1.3", "family" : "NPort"},
    "cpe:/o:moxa:nport_5600_series_firmware" :
        {"versionEndExcluding" : "3.8", "family" : "MoxaNPort5600"},
    "cpe:/o:moxa:nport_5600-8-dt_series_firmware" :
        {"versionEndExcluding" : "2.5", "family" : "MoxaNPort5600"},
    "cpe:/o:moxa:nport_5600-8-dtl_series_firmware" :
        {"versionEndExcluding" : "2.5", "family" : "MoxaNPort5600"},
    "cpe:/o:moxa:nport_6000_series_firmware" :
        {"versionEndExcluding" : "2.7", "family" : "NPort"},
    "cpe:/o:moxa:nport_6100_series_firmware" :
        {"versionEndExcluding" : "1.16", "family" : "NPort"},
    "cpe:/o:moxa:nport_6110_series_firmware" :
        {"family" : "NPort"},
    "cpe:/o:moxa:nport_ia5450a_series_firmware" :
        {"versionEndExcluding" : "1.4", "family" : "NPort"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);
VendorProductVersionCPE
moxanport_5110_series_firmwarecpe:/o:moxa:nport_5110_series_firmware
moxanport_5130_series_firmwarecpe:/o:moxa:nport_5130_series_firmware
moxanport_5150_series_firmwarecpe:/o:moxa:nport_5150_series_firmware
moxanport_5150ai-m12_series_firmwarecpe:/o:moxa:nport_5150ai-m12_series_firmware
moxanport_5100a_series_firmwarecpe:/o:moxa:nport_5100a_series_firmware
moxanport_p5150a_firmwarecpe:/o:moxa:nport_p5150a_firmware
moxanport_5200_series_firmwarecpe:/o:moxa:nport_5200_series_firmware
moxanport_5200a_series_firmwarecpe:/o:moxa:nport_5200a_series_firmware
moxanport_5250ai-m12_series_firmwarecpe:/o:moxa:nport_5250ai-m12_series_firmware
moxanport_5400_series_firmwarecpe:/o:moxa:nport_5400_series_firmware
Rows per page:
1-10 of 181

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.009 Low

EPSS

Percentile

82.8%

Related for TENABLE_OT_MOXA_CVE-2016-9369.NASL