Vulnerability Details CVE-2023-5627
A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 23.7%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2023-5627
-
cpe:2.3:h:moxa:nport_6150-t:-
-
cpe:2.3:h:moxa:nport_6150:-
-
cpe:2.3:h:moxa:nport_6250-m-sc-t:-
-
cpe:2.3:h:moxa:nport_6250-m-sc:-
-
cpe:2.3:h:moxa:nport_6250-s-sc-t:-
-
cpe:2.3:h:moxa:nport_6250-s-sc:-
-
cpe:2.3:h:moxa:nport_6250-t:-
-
cpe:2.3:h:moxa:nport_6250:-
-
cpe:2.3:h:moxa:nport_6450-t:-
-
cpe:2.3:h:moxa:nport_6450:-
-
cpe:2.3:h:moxa:nport_6610-16-48v:-
-
cpe:2.3:h:moxa:nport_6610-16:-
-
cpe:2.3:h:moxa:nport_6610-32-48v:-
-
cpe:2.3:h:moxa:nport_6610-32:-
-
cpe:2.3:h:moxa:nport_6610-8-48v:-
-
cpe:2.3:h:moxa:nport_6610-8:-
-
cpe:2.3:h:moxa:nport_6650-16-48v:-
-
cpe:2.3:h:moxa:nport_6650-16-hv-t:-
-
cpe:2.3:h:moxa:nport_6650-16-t:-
-
cpe:2.3:h:moxa:nport_6650-16:-
-
cpe:2.3:h:moxa:nport_6650-32-48v:-
-
cpe:2.3:h:moxa:nport_6650-32-hv-t:-
-
cpe:2.3:h:moxa:nport_6650-32:-
-
cpe:2.3:h:moxa:nport_6650-8-48v:-
-
cpe:2.3:h:moxa:nport_6650-8-hv-t:-
-
cpe:2.3:h:moxa:nport_6650-8-t:-
-
cpe:2.3:h:moxa:nport_6650-8:-
-
cpe:2.3:o:moxa:nport_6150-t_firmware:-
-
cpe:2.3:o:moxa:nport_6150-t_firmware:1.21
-
cpe:2.3:o:moxa:nport_6150_firmware:-
-
cpe:2.3:o:moxa:nport_6150_firmware:1.21
-
cpe:2.3:o:moxa:nport_6250-m-sc-t_firmware:-
-
cpe:2.3:o:moxa:nport_6250-m-sc-t_firmware:1.21
-
cpe:2.3:o:moxa:nport_6250-m-sc_firmware:-
-
cpe:2.3:o:moxa:nport_6250-m-sc_firmware:1.21
-
cpe:2.3:o:moxa:nport_6250-s-sc-t_firmware:-
-
cpe:2.3:o:moxa:nport_6250-s-sc-t_firmware:1.21
-
cpe:2.3:o:moxa:nport_6250-s-sc_firmware:-
-
cpe:2.3:o:moxa:nport_6250-s-sc_firmware:1.21
-
cpe:2.3:o:moxa:nport_6250-t_firmware:-
-
cpe:2.3:o:moxa:nport_6250-t_firmware:1.21
-
cpe:2.3:o:moxa:nport_6250_firmware:-
-
cpe:2.3:o:moxa:nport_6250_firmware:1.21
-
cpe:2.3:o:moxa:nport_6450-t_firmware:-
-
cpe:2.3:o:moxa:nport_6450-t_firmware:1.21
-
cpe:2.3:o:moxa:nport_6450_firmware:-
-
cpe:2.3:o:moxa:nport_6450_firmware:1.21
-
cpe:2.3:o:moxa:nport_6610-16-48v_firmware:-
-
cpe:2.3:o:moxa:nport_6610-16-48v_firmware:1.21
-
cpe:2.3:o:moxa:nport_6610-16_firmware:-
-
cpe:2.3:o:moxa:nport_6610-16_firmware:1.21
-
cpe:2.3:o:moxa:nport_6610-32-48v_firmware:-
-
cpe:2.3:o:moxa:nport_6610-32-48v_firmware:1.21
-
cpe:2.3:o:moxa:nport_6610-32_firmware:-
-
cpe:2.3:o:moxa:nport_6610-32_firmware:1.21
-
cpe:2.3:o:moxa:nport_6610-8-48v_firmware:-
-
cpe:2.3:o:moxa:nport_6610-8-48v_firmware:1.21
-
cpe:2.3:o:moxa:nport_6610-8_firmware:-
-
cpe:2.3:o:moxa:nport_6610-8_firmware:1.21
-
cpe:2.3:o:moxa:nport_6650-16-48v_firmware:-
-
cpe:2.3:o:moxa:nport_6650-16-48v_firmware:1.21
-
cpe:2.3:o:moxa:nport_6650-16-hv-t_firmware:-
-
cpe:2.3:o:moxa:nport_6650-16-hv-t_firmware:1.21
-
cpe:2.3:o:moxa:nport_6650-16-t_firmware:-
-
cpe:2.3:o:moxa:nport_6650-16-t_firmware:1.21
-
cpe:2.3:o:moxa:nport_6650-16_firmware:-
-
cpe:2.3:o:moxa:nport_6650-16_firmware:1.21
-
cpe:2.3:o:moxa:nport_6650-32-48v_firmware:-
-
cpe:2.3:o:moxa:nport_6650-32-48v_firmware:1.21
-
cpe:2.3:o:moxa:nport_6650-32-hv-t_firmware:-
-
cpe:2.3:o:moxa:nport_6650-32-hv-t_firmware:1.21
-
cpe:2.3:o:moxa:nport_6650-32_firmware:-
-
cpe:2.3:o:moxa:nport_6650-32_firmware:1.21
-
cpe:2.3:o:moxa:nport_6650-8-48v_firmware:-
-
cpe:2.3:o:moxa:nport_6650-8-48v_firmware:1.21
-
cpe:2.3:o:moxa:nport_6650-8-hv-t_firmware:-
-
cpe:2.3:o:moxa:nport_6650-8-hv-t_firmware:1.21
-
cpe:2.3:o:moxa:nport_6650-8-t_firmware:-
-
cpe:2.3:o:moxa:nport_6650-8-t_firmware:1.21
-
cpe:2.3:o:moxa:nport_6650-8_firmware:-
-
cpe:2.3:o:moxa:nport_6650-8_firmware:1.21