Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-46559

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-26 Jan, 2022 | 01:11
Updated At-04 Aug, 2024 | 05:10
Rejected At-
Credits

The firmware on Moxa TN-5900 devices through 3.1 has a weak algorithm that allows an attacker to defeat an inspection mechanism for integrity protection.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:26 Jan, 2022 | 01:11
Updated At:04 Aug, 2024 | 05:10
Rejected At:
▼CVE Numbering Authority (CNA)

The firmware on Moxa TN-5900 devices through 3.1 has a weak algorithm that allows an attacker to defeat an inspection mechanism for integrity protection.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.moxa.com/en/support/product-support/security-advisory/tn-5900-secure-routers-vulnerabilities
x_refsource_MISC
Hyperlink: https://www.moxa.com/en/support/product-support/security-advisory/tn-5900-secure-routers-vulnerabilities
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.moxa.com/en/support/product-support/security-advisory/tn-5900-secure-routers-vulnerabilities
x_refsource_MISC
x_transferred
Hyperlink: https://www.moxa.com/en/support/product-support/security-advisory/tn-5900-secure-routers-vulnerabilities
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:26 Jan, 2022 | 02:15
Updated At:08 Aug, 2023 | 14:22

The firmware on Moxa TN-5900 devices through 3.1 has a weak algorithm that allows an attacker to defeat an inspection mechanism for integrity protection.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CPE Matches

Moxa Inc.
moxa
>>tn-5900_firmware>>Versions up to 3.1(inclusive)
cpe:2.3:o:moxa:tn-5900_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>tn-5900>>-
cpe:2.3:h:moxa:tn-5900:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-345Primarynvd@nist.gov
CWE ID: CWE-345
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.moxa.com/en/support/product-support/security-advisory/tn-5900-secure-routers-vulnerabilitiescve@mitre.org
Vendor Advisory
Hyperlink: https://www.moxa.com/en/support/product-support/security-advisory/tn-5900-secure-routers-vulnerabilities
Source: cve@mitre.org
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

52Records found

CVE-2024-45410
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-4.63% / 88.85%
||
7 Day CHG~0.00%
Published-19 Sep, 2024 | 22:51
Updated-25 Sep, 2024 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HTTP client can remove the X-Forwarded headers in Traefik

Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers such as X-Forwarded-Host or X-Forwarded-Port are added by Traefik before the request is routed to the application. For a HTTP client, it should not be possible to remove or modify these headers. Since the application trusts the value of these headers, security implications might arise, if they can be modified. For HTTP/1.1, however, it was found that some of theses custom headers can indeed be removed and in certain cases manipulated. The attack relies on the HTTP/1.1 behavior, that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been addressed in release versions 2.11.9 and 3.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-traefiktraefiktraefik
Product-traefiktraefiktraefik
CWE ID-CWE-348
Use of Less Trusted Source
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-33687
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.77%
||
7 Day CHG~0.00%
Published-24 Jun, 2024 | 15:03
Updated-13 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient verification of data authenticity issue exists in NJ Series CPU Unit all versions and NX Series CPU Unit all versions. If a user program in the affected product is altered, the product may not be able to detect the alteration.

Action-Not Available
Vendor-omronOMRON Corporation
Product-nx1p2-1040dt1_firmwarenx1p2-9024dt1_firmwarenx102-1100_firmwarenj501-4300_firmwarenj101-1020nx701-1600_firmwarenx102-1020_firmwarenj501-4300nj501-5300-1nj-pd3001nx1w-mab221nj501-1320_firmwarenx1p2-1040dt_firmwarenj501-5300_firmwarenj501-1340nx701-z700_firmwarenj501-4310_firmwarenx1w-mab221_firmwarenx701-1600nj501-r420nj101-9000nx102-9000_firmwarenj101-1000nx102-1120nj501-4500nx1p2-9024dtnx102-1020nj-pa3001nj501-4400_firmwarenj501-1300_firmwarenx1p2-1040dt1nj501-4400nj101-1020_firmwarenx701-z700nx701-1700_firmwarenj501-1320nx1p2-9024dt_firmwarenj501-5300-1_firmwarenj501-4310nj101-9000_firmwarenx1p2-1040dtnj501-1400nx102-1100nj101-9020nx1w-adb21nj501-r520nj501-r400_firmwarenj-pa3001_firmwarenj501-r400nj501-1340_firmwarenj101-1000_firmwarenx1p2-1140dt1nj501-r320nj-pd3001_firmwarenj501-4500_firmwarenx1p2-9024dt1nx701-1720_firmwarenx102-1220_firmwarenx102-1200nj501-r320_firmwarenx1w-cif01nx102-1000_firmwarenx102-9020_firmwarenj501-5300nj501-1500nx1w-dab21v_firmwarenx1w-adb21_firmwarenx701-1700nj501-140nx102-1220nj301-1100_firmwarenx701-1720nj501-r300_firmwarenx102-1000nj501-1520_firmwarenx1w-cif11_firmwarenj301-1200nx1w-cif01_firmwarenj501-r520_firmwarenj101-9020_firmwarenj501-r300nj301-1100nj501-4320nx102-9020nx102-1120_firmwarenj501-r500_firmwarenx1w-cif12nx1p2-1140dt_firmwarenx1p2-1140dt1_firmwarenx1w-cif11nx1w-cif12_firmwarenj501-1300nj501-r500nx701-1620nx701-z600_firmwarenj501-1520nx701-z600nx102-9000nj501-4320_firmwarenx701-1620_firmwarenj501-1500_firmwarenx1w-dab21vnj301-1200_firmwarenx102-1200_firmwarenj501-r420_firmwarenj501-1400_firmwarenj501-1420nx1p2-1140dtnj501-140_firmwarenj501-1420_firmwareNX Series CPU UnitNJ Series CPU Unit
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
  • Previous
  • 1
  • 2
  • Next
Details not found