{"api_version":"1","generated_at":"2026-04-23T20:21:19+00:00","cve":"CVE-2023-39981","urls":{"html":"https://cve.report/CVE-2023-39981","api":"https://cve.report/api/cve/CVE-2023-39981.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-39981","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-39981"},"summary":{"title":"CVE-2023-39981","description":"A vulnerability that allows for unauthorized access has been discovered in MXsecurity versions prior to v1.0.1. This vulnerability arises from inadequate authentication measures, potentially leading to the disclosure of device information by a remote attacker.","state":"PUBLIC","assigner":"psirt@moxa.com","published_at":"2023-09-02 13:15:00","updated_at":"2023-09-07 20:38:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities","name":"https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities","refsource":"MISC","tags":[],"title":"MXsecurity Series Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-39981","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39981","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"39981","vulnerable":"1","versionEndIncluding":"1.0.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"moxa","cpe5":"mxsecurity","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-39981","ASSIGNER":"psirt@moxa.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability that allows for unauthorized access has been discovered in MXsecurity versions prior to v1.0.1. This vulnerability arises from inadequate authentication measures, potentially leading to the disclosure of device information by a remote attacker.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-287: Improper Authentication","cweId":"CWE-287"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Moxa","product":{"product_data":[{"product_name":"MXsecurity Series","version":{"version_data":[{"version_affected":"<=","version_name":"1.0","version_value":"1.0.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities","refsource":"MISC","name":"https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"solution":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Moxa has developed appropriate solution to address the vulnerability. The solution for affected product is shown below.<br><ul><li>MXsecurity: Please upgrade to software v1.1.0 or higher.</li></ul>"}],"value":"Moxa has developed appropriate solution to address the vulnerability. The solution for affected product is shown below.\n  *  MXsecurity: Please upgrade to software v1.1.0 or higher.\n\n\n"}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-09-02 13:15:00","lastModifiedDate":"2023-09-07 20:38:00","problem_types":["CWE-287"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:moxa:mxsecurity:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}