Moxa ioLogik E1200 Series Cross-Site Request Forgery (CVE-2023-5961)

high Tenable OT Security Plugin ID 501851

Synopsis

The remote OT asset is affected by a vulnerability.

Description

A Cross-Site Request Forgery (CSRF) vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. An attacker can exploit this vulnerability to trick a client into making an unintentional request to the web server, which will be treated as an authentic request. This vulnerability may lead an attacker to perform operations on behalf of the victimized user.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

http://www.nessus.org/u?221987d8

Plugin Details

Severity: High

ID: 501851

Version: 1.3

Type: remote

Family: Tenable.ot

Published: 12/28/2023

Updated: 12/5/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-5961

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:moxa:iologik_e1210_firmware

Required KB Items: Tenable.ot/Moxa

Exploit Ease: No known exploits are available

Patch Publication Date: 12/23/2023

Vulnerability Publication Date: 12/23/2023

Reference Information

CVE: CVE-2023-5961

CWE: 352