CVE-2023-1257 (GCVE-0-2023-1257)
Vulnerability from cvelistv5
Published
2023-03-07 16:54
Modified
2025-01-16 21:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system.
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| MOXA | UC-8580 Series |
Version: V1.1 |
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:40:59.879Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-1257",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-16T20:31:37.359721Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-16T21:55:20.265Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "UC-8580 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.1"
}
]
},
{
"product": "UC-8540 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.0 to V1.2"
}
]
},
{
"product": "UC-8410A Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V2.2"
}
]
},
{
"product": "UC-8200 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.0 to V2.4"
}
]
},
{
"product": "UC-8100A-ME-T Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.0 to V1.1"
}
]
},
{
"product": "UC-8100 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.2"
}
]
},
{
"product": "UC-5100 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.2"
}
]
},
{
"product": "UC-3100 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.2 to V2.0"
}
]
},
{
"product": "UC-2100 Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.3 to V1.5"
}
]
},
{
"product": "UC-2100-W Series",
"vendor": "MOXA",
"versions": [
{
"status": "affected",
"version": "V1.3 to V1.5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device\u2019s authentication files to create a new user and gain full access to the system."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-1263",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-03-07T16:54:21.053Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "CVE-2023-1257",
"x_generator": {
"engine": "VINCE 2.0.6",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2023-1257"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2023-1257",
"datePublished": "2023-03-07T16:54:21.053Z",
"dateReserved": "2023-03-07T16:16:20.728Z",
"dateUpdated": "2025-01-16T21:55:20.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T05:40:59.879Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-1257\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-16T20:31:37.359721Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-16T20:31:38.941Z\"}}], \"cna\": {\"title\": \"CVE-2023-1257\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.6, \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"MOXA\", \"product\": \"UC-8580 Series\", \"versions\": [{\"status\": \"affected\", \"version\": \"V1.1\"}]}, {\"vendor\": \"MOXA\", \"product\": \"UC-8540 Series\", \"versions\": [{\"status\": \"affected\", \"version\": \"V1.0 to V1.2\"}]}, {\"vendor\": \"MOXA\", \"product\": \"UC-8410A Series\", \"versions\": [{\"status\": \"affected\", \"version\": \"V2.2\"}]}, {\"vendor\": \"MOXA\", \"product\": \"UC-8200 Series\", \"versions\": [{\"status\": \"affected\", \"version\": \"V1.0 to V2.4\"}]}, {\"vendor\": \"MOXA\", \"product\": \"UC-8100A-ME-T Series\", \"versions\": [{\"status\": \"affected\", \"version\": \"V1.0 to V1.1\"}]}, {\"vendor\": \"MOXA\", \"product\": \"UC-8100 Series\", \"versions\": [{\"status\": \"affected\", \"version\": \"V1.2\"}]}, {\"vendor\": \"MOXA\", \"product\": \"UC-5100 Series\", \"versions\": [{\"status\": \"affected\", \"version\": \"V1.2\"}]}, {\"vendor\": \"MOXA\", \"product\": \"UC-3100 Series\", \"versions\": [{\"status\": \"affected\", \"version\": \"V1.2 to V2.0\"}]}, {\"vendor\": \"MOXA\", \"product\": \"UC-2100 Series\", \"versions\": [{\"status\": \"affected\", \"version\": \"V1.3 to V1.5\"}]}, {\"vendor\": \"MOXA\", \"product\": \"UC-2100-W Series\", \"versions\": [{\"status\": \"affected\", \"version\": \"V1.3 to V1.5\"}]}], \"references\": [{\"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04\"}], \"x_generator\": {\"env\": \"prod\", \"engine\": \"VINCE 2.0.6\", \"origin\": \"https://cveawg.mitre.org/api/cve/CVE-2023-1257\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device\\u2019s authentication files to create a new user and gain full access to the system.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-1263\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2023-03-07T16:54:21.053Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-1257\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-16T21:55:20.265Z\", \"dateReserved\": \"2023-03-07T16:16:20.728Z\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"datePublished\": \"2023-03-07T16:54:21.053Z\", \"assignerShortName\": \"icscert\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…