{"api_version":"1","generated_at":"2026-04-23T20:20:43+00:00","cve":"CVE-2023-39982","urls":{"html":"https://cve.report/CVE-2023-39982","api":"https://cve.report/api/cve/CVE-2023-39982.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-39982","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-39982"},"summary":{"title":"CVE-2023-39982","description":"A vulnerability has been identified in MXsecurity versions prior to v1.0.1. The vulnerability may put the confidentiality and integrity of SSH communications at risk on the affected device. This vulnerability is attributed to a hard-coded SSH host key, which might facilitate man-in-the-middle attacks and enable the decryption of SSH traffic.","state":"PUBLIC","assigner":"psirt@moxa.com","published_at":"2023-09-02 13:15:00","updated_at":"2023-09-08 13:23:00"},"problem_types":["CWE-798"],"metrics":[],"references":[{"url":"https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities","name":"https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities","refsource":"MISC","tags":[],"title":"MXsecurity Series Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-39982","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39982","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"39982","vulnerable":"1","versionEndIncluding":"1.0.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"moxa","cpe5":"mxsecurity","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-39982","ASSIGNER":"psirt@moxa.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability has been identified in MXsecurity versions prior to v1.0.1. The vulnerability may put the confidentiality and integrity of SSH communications at risk on the affected device. This vulnerability is attributed to a hard-coded SSH host key, which might facilitate man-in-the-middle attacks and enable the decryption of SSH traffic.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-798: Use of Hard-coded Credentials","cweId":"CWE-798"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Moxa","product":{"product_data":[{"product_name":"MXsecurity Series","version":{"version_data":[{"version_affected":"<=","version_name":"1.0","version_value":"1.0.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities","refsource":"MISC","name":"https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"solution":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Moxa has developed appropriate solution to address the vulnerability. The solution for affected product is shown below.<br><ul><li>MXsecurity: Please upgrade to software v1.1.0 or higher.</li></ul>"}],"value":"Moxa has developed appropriate solution to address the vulnerability. The solution for affected product is shown below.\n  *  MXsecurity: Please upgrade to software v1.1.0 or higher.\n\n\n"}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-09-02 13:15:00","lastModifiedDate":"2023-09-08 13:23:00","problem_types":["CWE-798"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:moxa:mxsecurity:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}