{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T07:15:11.934","vulnerabilities":[{"cve":{"id":"CVE-2020-27185","sourceIdentifier":"vulnerability@kaspersky.com","published":"2021-05-14T13:15:07.330","lastModified":"2024-11-21T05:20:50.210","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cleartext transmission of sensitive information via Moxa Service in NPort IA5000A series serial devices. Successfully exploiting the vulnerability could enable attackers to read authentication data, device configuration, and other sensitive data transmitted over Moxa Service."},{"lang":"es","value":"Una transmisión de texto sin cifrar de información confidencial por medio del servicio Moxa en los dispositivos seriales de la serie NPort IA5000A.&#xa0;Una explotación con éxito de la vulnerabilidad podría permitir a los atacantes leer datos de autenticación, la configuración del dispositivo y otros datos confidenciales transmitidos mediante el Servicio Moxa"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-319"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:moxa:nport_ia5150a_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.4","matchCriteriaId":"E529D705-C625-4FFC-AC48-FE2CFE32922D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:moxa:nport_ia5150a:-:*:*:*:*:*:*:*","matchCriteriaId":"EBA01711-3023-4961-872F-5DB4792C13C3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:moxa:nport_ia5250a_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.4","matchCriteriaId":"AD9AF3B1-D1A2-450C-9D29-30CC95DAC558"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:moxa:nport_ia5250a:-:*:*:*:*:*:*:*","matchCriteriaId":"4C7805EF-B929-4DB3-9D68-FEBCD0B69781"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:moxa:nport_ia5450a_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.7","matchCriteriaId":"3575CF6C-0E61-4527-8D8B-F7C7A46F0FAC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:moxa:nport_ia5450a:-:*:*:*:*:*:*:*","matchCriteriaId":"D377FBAC-FF5B-4DFB-9ECA-4D148AFE0CDE"}]}]}],"references":[{"url":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2021/05/11/klcert-20-021%2C","source":"vulnerability@kaspersky.com"},{"url":"https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities","source":"vulnerability@kaspersky.com","tags":["Vendor Advisory"]},{"url":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2021/05/11/klcert-20-021%2C","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}