Weak Moxa units expose industrial networks to assaults

Industrial networking and communications supplier Moxa is warning of a high-severity and a crucial vulnerability that affect numerous fashions of its mobile routers, safe routers, and community safety home equipment.

The 2 seurity points enable distant attackers to get root privileges on weak units and to execute arbitrary instructions, which might result in arbitrary code execution.

Dangers on Moxa routers

Moxa units are utilized in environments with industrial automation and management programs from transportation, utilities and power, and telecommunications sectors.

On Friday, the seller issued an pressing warning for the next two vulnerabilities:

CVE-2024-9138 (8.6, excessive severity rating): Onerous-coded credentials that allow authenticated customers to escalate privileges to root

CVE-2024-9140 (9.3, crucial severity rating): OS command injection flaw attributable to exploiting improper enter restrictions, resulting in arbitrary code execution

The second flaw is especially harmful as a result of it may be exploited by distant attackers.

Moxa has launched firmware updates that deal with the vulnerabilities and notes that “immediate action is strongly recommended to prevent potential exploitation and mitigate these risks.”

The next units are impacted by each CVE-2024-9140 and CVE-2024-9138:

  • EDR-8010 Sequence on firmware 3.13.1 and earlier
  • EDR-G9004 Sequence on firmware 3.13.1 and earlier
  • EDR-G9010 Sequence on firmware 3.13.1 and earlier
  • EDF-G1002-BP Sequence    on firmware 3.13.1 and earlier
  • NAT-102 Sequence on firmware 1.0.5 and earlier
  • OnCell G4302-LTE4 Sequence on firmware 3.13 and earlier
  • TN-4900 Sequence on firmware 3.13 and earlier

Moreover, EDR-810 Sequence on firmware 5.12.37 and older, EDR-G902 Sequence on firmware 5.7.25 and older, and TN-4900 Sequence on firmware 3.13 and older are weak solely to CVE-2024-9138.

Customers of EDR-8010 Sequence, EDR-G9004 Sequence, EDR-G9010, and EDF-G1002-BP Sequence ought to improve to firmware model 3.14, launched on December 31, 2024, to deal with the issue.

It’s advisable to observe the obtain hyperlinks for every gadget mannequin supplied on Moxa’s bulletin to acquire the official firmware photos.

Admins of OnCell G4302-LTE4 Sequence and TN-4900 Sequence are suggested to contact Moxa help to obtain steerage on patching.

For the NAT-102 Sequence, there’s at present no patch obtainable, and directors are really helpful to use mitigations.

Moxa suggests limiting the gadget’s community publicity and SSH entry and utilizing firewalls, IDS, or an Intrusion Prevention System (IPS) to observe and block exploitation makes an attempt.

The advisory explicitly mentions that the MRC-1002 Sequence, TN-5900 Sequence, and OnCell 3120-LTE-1 Sequence units will not be weak to both flaw.

Recent articles

U.S. Sanctions Chinese language Cybersecurity Agency Over Treasury Hack Tied to Silk Hurricane

The U.S. Treasury Division's Workplace of International Property Management...

FTC cracks down on Genshin Impression gacha loot field practices

Genshin Impression developer Cognosphere (aka Hoyoverse)...

New ‘Sneaky 2FA’ Phishing Package Targets Microsoft 365 Accounts with 2FA Code Bypass

î ‚Jan 17, 2025î „Ravie LakshmananCybersecurity / Menace Intelligence Cybersecurity researchers have...