{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-4217","assignerOrgId":"2e0a0ee2-d866-482a-9f5e-ac03d156dbaa","state":"PUBLISHED","assignerShortName":"Moxa","dateReserved":"2023-08-08T03:26:03.855Z","datePublished":"2023-11-02T16:04:29.681Z","dateUpdated":"2024-09-05T14:35:58.070Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"PT-G503 Series","vendor":"Moxa","versions":[{"lessThanOrEqual":"5.2","status":"affected","version":"1.0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>A vulnerability has been identified in PT-G503 Series versions prior to v5.2, where the session cookies attribute is not set properly in the affected application. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.</p>"}],"value":"A vulnerability has been identified in PT-G503 Series versions prior to v5.2, where the session cookies attribute is not set properly in the affected application. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.\n\n"}],"impacts":[{"capecId":"CAPEC-107","descriptions":[{"lang":"en","value":"CAPEC-107: Cross Site Tracing"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.1,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1004","description":"CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"2e0a0ee2-d866-482a-9f5e-ac03d156dbaa","shortName":"Moxa","dateUpdated":"2023-11-02T16:04:29.681Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230203-pt-g503-series-multiple-vulnerabilities"}],"source":{"discovery":"EXTERNAL"},"title":"Session cookies attribute not set properly","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">Users should carefully use HTTP if necessary, and could try to replace HTTP by HTTPS when using the web service. Additionally, refer to the following mitigation measures to deploy the product in an appropriate product security context.</span><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;<br><div><p>Moxa recommends users follow CISA recommendations. &nbsp;</p></div><div><ul><li>Reduce network exposure by ensuring that all control system devices and systems are not accessible from the Internet.</li><li>Place control system networks and remote devices behind firewalls, isolating them from business networks.</li><li>When remote access is necessary, employ secure methods such as Virtual Private Networks (VPNs). It is important to note that VPNs may have vulnerabilities and should be kept up to date with the latest available version. Remember that the security of a VPN depends on the security of its connected devices.</li></ul></div></span>"}],"value":"Users should carefully use HTTP if necessary, and could try to replace HTTP by HTTPS when using the web service. Additionally, refer to the following mitigation measures to deploy the product in an appropriate product security context. \nMoxa recommends users follow CISA recommendations.  \n\n\n\n  *  Reduce network exposure by ensuring that all control system devices and systems are not accessible from the Internet.\n  *  Place control system networks and remote devices behind firewalls, isolating them from business networks.\n  *  When remote access is necessary, employ secure methods such as Virtual Private Networks (VPNs). It is important to note that VPNs may have vulnerabilities and should be kept up to date with the latest available version. Remember that the security of a VPN depends on the security of its connected devices.\n\n\n\n\n"}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:17:12.234Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230203-pt-g503-series-multiple-vulnerabilities"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-05T14:27:50.198169Z","id":"CVE-2023-4217","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-05T14:35:58.070Z"}}]}}