9 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.008 Low
EPSS
Percentile
81.4%
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Moxa MGate 5105-MB-EIP firmware version 4.1. Authentication is required to exploit this vulnerability. The specific flaw exists within the DestIP parameter within MainPing.asp.
The issue results from the lack of proper validation of a user- supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9552.
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(501487);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/08/03");
script_cve_id("CVE-2020-8858");
script_name(english:"Moxa MGate 5105-MB-EIP DestIP Command Injection Remote Code Execution (CVE-2020-8858)");
script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
script_set_attribute(attribute:"description", value:
"This vulnerability allows remote attackers to execute arbitrary code
on affected installations of Moxa MGate 5105-MB-EIP firmware version
4.1. Authentication is required to exploit this vulnerability. The
specific flaw exists within the DestIP parameter within MainPing.asp.
The issue results from the lack of proper validation of a user-
supplied string before using it to execute a system call. An attacker
can leverage this vulnerability to execute code in the context of
root. Was ZDI-CAN-9552.
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
# https://www.moxa.com/en/support/support/security-advisory/mgate-5105-mb-eip-series-protocol-gateways-vulnerability
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?608ec18c");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-20-214/");
script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-8858");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(78);
script_set_attribute(attribute:"vuln_publication_date", value:"2020/02/14");
script_set_attribute(attribute:"patch_publication_date", value:"2020/02/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/08/02");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:mgate_5105-mb-eip-t_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:moxa:mgate_5105-mb-eip_firmware");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Tenable.ot");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("tenable_ot_api_integration.nasl");
script_require_keys("Tenable.ot/Moxa");
exit(0);
}
include('tenable_ot_cve_funcs.inc');
get_kb_item_or_exit('Tenable.ot/Moxa');
var asset = tenable_ot::assets::get(vendor:'Moxa');
var vuln_cpes = {
"cpe:/o:moxa:mgate_5105-mb-eip_firmware" :
{"versionEndIncluding" : "4.1", "family" : "MoxaMGate"},
"cpe:/o:moxa:mgate_5105-mb-eip-t_firmware" :
{"versionEndIncluding" : "4.1", "family" : "MoxaMGate"}
};
tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);
Vendor | Product | Version | CPE |
---|---|---|---|
moxa | mgate_5105-mb-eip-t_firmware | cpe:/o:moxa:mgate_5105-mb-eip-t_firmware | |
moxa | mgate_5105-mb-eip_firmware | cpe:/o:moxa:mgate_5105-mb-eip_firmware |
9 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.008 Low
EPSS
Percentile
81.4%