cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-4929,https://securityvulnerability.io/vulnerability/CVE-2023-4929,NPort 5000 Series Firmware Improper Validation of Integrity Check Vulnerability,"All firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices. ",Moxa,"Nport 5000ai-m12 Series,Nport 5100 Series,Nport 5100a Series,Nport 5200 Series,Nport 5200a Series,Nport 5400 Series,Nport 5600 Series,Nport 5600-dt Series,Nport Ia5000 Series,Nport Ia5000a Series,Nport Ia5000a-i/o Series,Nport Iaw5000a-i/o Series,Nport P5150a Series",6.5,MEDIUM,0.0008900000248104334,false,,false,false,false,,,false,false,,2023-10-03T14:15:00.000Z,0 CVE-2020-27185,https://securityvulnerability.io/vulnerability/CVE-2020-27185,,"Cleartext transmission of sensitive information via Moxa Service in NPort IA5000A series serial devices. Successfully exploiting the vulnerability could enable attackers to read authentication data, device configuration, and other sensitive data transmitted over Moxa Service.",Moxa,Nport Ia5000a Series With Moxa Service Enabled,7.5,HIGH,0.0017800000496208668,false,,false,false,false,,,false,false,,2021-05-14T12:06:20.000Z,0 CVE-2020-27184,https://securityvulnerability.io/vulnerability/CVE-2020-27184,,"The NPort IA5000A Series devices use Telnet as one of the network device management services. Telnet does not support the encryption of client-server communications, making it vulnerable to Man-in-the-Middle attacks.",Moxa,Nport Ia5000a Series With Telnet Enabled,5.9,MEDIUM,0.0008099999977275729,false,,false,false,false,,,false,false,,2021-05-14T12:06:15.000Z,0 CVE-2020-27150,https://securityvulnerability.io/vulnerability/CVE-2020-27150,,"In multiple versions of NPort IA5000A Series, the result of exporting a device’s configuration contains the passwords of all users on the system and other sensitive data in the original form if “Pre-shared key” doesn’t set.",Moxa,Nport Ia5000a Series,7.5,HIGH,0.0017800000496208668,false,,false,false,false,,,false,false,,2021-05-14T11:13:41.000Z,0 CVE-2020-27149,https://securityvulnerability.io/vulnerability/CVE-2020-27149,,"By exploiting a vulnerability in NPort IA5150A/IA5250A Series before version 1.5, a user with “Read Only” privilege level can send requests via the web console to have the device’s configuration changed.",Moxa,Nport Ia5000a Series With Web Console Enabled,6.5,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2021-05-14T11:13:37.000Z,0