{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-4228","assignerOrgId":"2e0a0ee2-d866-482a-9f5e-ac03d156dbaa","state":"PUBLISHED","assignerShortName":"Moxa","dateReserved":"2023-08-08T07:25:39.362Z","datePublished":"2023-08-24T06:19:40.559Z","dateUpdated":"2024-10-01T16:16:32.729Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"ioLogik 4000 Series","vendor":"Moxa","versions":[{"lessThanOrEqual":"1.6","status":"affected","version":"1.0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, where the session cookies attribute is not set properly in the affected application. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.</p>"}],"value":"A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, where the session cookies attribute is not set properly in the affected application. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.\n\n"}],"impacts":[{"capecId":"CAPEC-107","descriptions":[{"lang":"en","value":"CAPEC-107 Cross Site Tracing"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.1,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1004","description":"CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"2e0a0ee2-d866-482a-9f5e-ac03d156dbaa","shortName":"Moxa","dateUpdated":"2023-08-24T06:19:40.559Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230310-iologik-4000-series-multiple-web-server-vulnerabilities-and-improper-access-control-vulnerability"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.<br><ul><li>ioLogik 4000 Series (ioLogik E4200): Please contact Moxa Technical Support for the security patch.</li></ul>"}],"value":"Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.\n  *  ioLogik 4000 Series (ioLogik E4200): Please contact Moxa Technical Support for the security patch.\n\n\n"}],"source":{"discovery":"EXTERNAL"},"title":"ioLogik 4000 Series: Session Cookies Attribute Not Set Properly","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:24:03.385Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230310-iologik-4000-series-multiple-web-server-vulnerabilities-and-improper-access-control-vulnerability"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-01T15:03:25.737027Z","id":"CVE-2023-4228","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-01T16:16:32.729Z"}}]}}