- Description
- Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary configuration protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. Any commands (including device reboot, configuration download or upload, or firmware upgrade) are accepted and executed by the device without authentication.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-319
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:oncell_g3150-hspa_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4EB5A49A-BC65-46F8-937A-59880E0DF816",
"versionEndIncluding": "1.6"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:oncell_g3150-hspa:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "818C840B-A1BB-4D67-9B39-7358542FE0A8"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:moxa:oncell_g3150-hspa-t_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "710E168D-27E4-47ED-BAD8-241432767E65",
"versionEndIncluding": "1.6"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:moxa:oncell_g3150-hspa-t:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "CBE7E4C9-CB5E-4DA0-8FFA-CA23A15CBC6A"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]