<?xml version="1.0" encoding="utf-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<atom:link href="https://www.moxa.com/en/rss/moxa-security-advisory" rel="self" type="application/rss+xml"/>
<title><![CDATA[Moxa Security Advisory]]></title>
<link><![CDATA[https://www.moxa.com/en/rss/moxa-security-advisory]]></link>
<description><![CDATA[Moxa Security Advisory]]></description>
<language><![CDATA[en-US]]></language>
<item>
  <title><![CDATA[Moxa’s Response Regarding Remote Authentication Bypass in GNU Inetutils Telnetd (CVE-2026-24061)]]></title>
  <description>
    <![CDATA[<p><strong>CVE-2026-24061</strong></p>

<p>telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a &quot;-f root&quot; value for the USER environment variable.</p>

<p>(Source:&nbsp;<a href="http://www.cve.org/" rel="nofollow">www.cve.org</a>)</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-267181-moxa’s-response-regarding-remote-authentication-bypass-in-gnu-inetutils-telnetd-(cve-2026-24061)</link>    
  <pubDate>
    Mon, 09 Mar 2026 14:23:20 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: Intel® Active Management Technology (AMT) Multiple Vulnerabilities (INTEL-SA-00709)]]></title>
  <description>
    <![CDATA[<p>The Intel&reg; Management Engine on the remote host has Active Management Technology (AMT) enabled by default, and has self-reported the version for multiple vulnerabilities, including:</p>

<ul>
	<li>Insufficient protection for credentials in Intel&reg; AMT and Intel&reg; Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access (CVE-2022-30601).</li>
	<li data-uuid="e37e6e53-bd15-48c8-9f40-cc431fab4fcb">Insufficient protection for credentials in Intel&reg; AMT and Intel&reg; Standard Manageability may allow a privileged user to potentially enable information disclosure via local access (CVE-2022-30944).</li>
	<li data-uuid="dad29f37-f1b6-443a-bbcb-085be9ae53a0">Improper access control in firmware for Intel&reg; AMT and Intel&reg; Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access (CVE-2022-28697).</li>
</ul>

<p>(Source:&nbsp;Tenable Nessus)</p>

<p>Since this is a critical severity issue,&nbsp;users are strongly advised to immediately apply the solutions to mitigate associated security risks.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-256823-security-enhancement-intel®-active-management-technology-(amt)-multiple-vulnerabilities-(intel-sa-00709)</link>    
  <pubDate>
    Mon, 09 Mar 2026 10:55:32 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: Intel® Converged Security Management Engine (CSME) Active Management Technology (AMT) Multiple Vulnerabilities (INTEL-SA-00391)]]></title>
  <description>
    <![CDATA[<p>The Intel&reg; Converged Security Management Engine (CSME) on the remote host is affected by multiple vulnerabilities in the Intel&reg; Active Management Technology (AMT) function, including the following:</p>

<ul>
	<li>Out-of-bounds write in IPv6 subsystem for Intel(R) AMT,&nbsp;Intel&reg;&nbsp;ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access. (CVE-2020-8752)</li>
	<li data-uuid="a6b7c51a-cf94-47e1-8f73-84498137a71f">Out-of-bounds read in subsystem for Intel&reg; AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access. (CVE-2020-8747)</li>
	<li data-uuid="a582c348-6744-46e7-8fa5-4d3ab76b9c7c">Out-of-bounds read in subsystem for Intel&reg; AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. (CVE-2020-8749)</li>
</ul>

<p>(Source:&nbsp;Tenable Nessus)</p>

<p>Since this is a critical severity issue,&nbsp;users are strongly advised to immediately apply the solutions to mitigate associated security risks.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-256822-security-enhancement-intel®-converged-security-management-engine-(csme)-active-management-technology-(amt)</link>    
  <pubDate>
    Mon, 09 Mar 2026 10:47:13 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: Intel® BIOS Firmware DoS (INTEL-SA-00813)]]></title>
  <description>
    <![CDATA[<p>Insufficient control flow management in the BIOS firmware for some Intel&reg; processors may allow a privileged user to potentially enable denial of service (DoS) via local access. (Source:&nbsp;Tenable Nessus)</p>

<p>Since this is a medium severity issue, users can assess their environment and adopt the solution during the next maintenance cycle.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-256821-security-enhancement-intel®-bios-firmware-dos-(intel-sa-00813)</link>    
  <pubDate>
    Mon, 09 Mar 2026 10:37:26 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2026-0714, CVE-2026-0715: Multiple Vulnerabilities in Industrial Computers]]></title>
  <description>
    <![CDATA[<p>This security advisory addresses two vulnerabilities&nbsp;identified in Industrial Computers.</p>

<p><strong>CVE-2026-0714</strong></p>

<p>A physical attack vulnerability exists in certain Moxa industrial computers using&nbsp;<strong>TPM-backed LUKS full-disk encryption</strong>&nbsp;on&nbsp;<strong>Moxa Industrial Linux 3</strong>, where the discrete TPM is connected to the CPU via an SPI bus.&nbsp;Exploitation requires&nbsp;<strong>invasive physical access</strong>, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data&nbsp;<strong>may allow offline decryption of eMMC contents</strong>.&nbsp;This attack&nbsp;<strong>cannot be performed through brief or opportunistic physical access</strong>&nbsp;and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis.&nbsp;<strong>Remote exploitation is not possible</strong>.</p>

<p>&nbsp;</p>

<p><strong>CVE-2026-0715</strong></p>

<p>Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device.&nbsp;An attacker with&nbsp;<strong>physical access</strong>&nbsp;to the device could use this information to access the bootloader menu via a serial interface. &nbsp;Access to the bootloader menu&nbsp;<strong>does not allow full system takeover or privilege escalation</strong>. The bootloader enforces digital signature verification and only permits flashing of&nbsp;<strong>Moxa-signed images</strong>. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential&nbsp;<strong>temporary denial-of-service condition</strong>&nbsp;if a valid image is reflashed.&nbsp;<strong>Remote exploitation is not possible</strong>.</p>

<p>Given the high severity of these issues, users should apply the solutions immediately to reduce security risks.</p>

<p>&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th style="width: 150px;">CVE ID</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>
			<p>CVE-2026-0714</p>
			</td>
			<td>
			<p>CWE-319: Cleartext Transmission of Sensitive Information</p>
			</td>
			<td>
			<p>CAPEC-401: Physically Hacking Hardware</p>
			</td>
		</tr>
		<tr>
			<td>
			<p>CVE-2026-0715</p>
			</td>
			<td>
			<p>CWE-522: Insufficiently Protected Credentials</p>
			</td>
			<td>
			<p>CAPEC-102: Session Sidejacking</p>
			</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>CVE ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2026-0714</td>
			<td>
			<p>CVSS 4.0: 7.0</p>
			</td>
			<td>
			<p>AV:P/AC:L/AT:N/PR:N/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</p>
			</td>
			<td style="text-align: center;">High</td>
			<td style="text-align: center;">No</td>
		</tr>
		<tr>
			<td>CVE-2026-0715</td>
			<td>
			<p>CVSS 4.0: 7.0</p>
			</td>
			<td>
			<p>AV:P/AC:L/AT:N/PR:N/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</p>
			</td>
			<td style="text-align: center;">High</td>
			<td style="text-align: center;">No</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers</link>    
  <pubDate>
    Fri, 06 Feb 2026 00:41:15 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2024-12297: Frontend Authorization Logic Disclosure Vulnerability in Ethernet Switches]]></title>
  <description>
    <![CDATA[<p>Multiple Moxa&#39;s&nbsp;Ethernet switches are vulnerable to an authentication bypass because of flaws in their authorization mechanism. Despite client-side and back-end server verification, attackers can exploit weaknesses in its implementation. This vulnerability may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.&nbsp;</p>

<p>Since this issue is considered high severity, users should immediately apply the solutions to mitigate associated security risks.</p>

<p>&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact</strong></p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>CWE-656: Reliance on Security Through Obscurity</p>
			</td>
			<td>CAPEC-49: Password Brute Forcing</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2024-12297</td>
			<td>
			<p>CVSS 4.0: 9.2</p>
			</td>
			<td>
			<p>AV:N/AC:L/AT:P/PR:N/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:L/SI:L/SA:L</p>
			</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241409-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-in-ethernet-switches</link>    
  <pubDate>
    Wed, 04 Feb 2026 14:39:55 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2023-38408: OpenSSH Vulnerability in Ethernet Switches]]></title>
  <description>
    <![CDATA[<p>This security advisory addresses a vulnerability identified in ethernet switches.</p>

<p><strong>CVE-2023-38408</strong></p>

<p>Because of an unreliable search path, the PKCS#11 feature in OpenSSH&rsquo;s ssh-agent before 9.3p2 allows remote code execution if an agent is sent to a system controlled by an attacker.&nbsp;(Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: This issue exists because of an incomplete fix for CVE-2016-10009. (Source: cve.org)</p>

<p>CVE-2023-38408 is related to&nbsp;the&nbsp;<strong>SSH agent</strong>&nbsp;component and can only be exploited when SSH agent forwarding is enabled.&nbsp;However, in typical deployment scenarios, Moxa&#39;s&nbsp;ethernet switches&nbsp;operate as&nbsp;<strong>SSH servers</strong>&nbsp;and does not enable `ssh-agent` or agent forwarding functionality. Therefore,&nbsp;<strong>the practical risk&nbsp;is considered very low</strong>&nbsp;because&nbsp;the conditions required to trigger this vulnerability are not present by default. This issue is considered low risk,&nbsp;users may evaluate their environments and decide if updating is required.</p>

<p>&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th style="width: 150px;">CVE ID</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2023-38408</td>
			<td>
			<p>CWE-428: Unquoted Search Path or Element</p>
			</td>
			<td>Remote code execution if an agent is forwarded to an attacker-controlled system.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>CVE ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2023-38408</td>
			<td>
			<p>CVSS 3.1: 9.8</p>
			</td>
			<td>
			<p>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</p>
			</td>
			<td>Critical</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-256261-cve-2023-38408-openssh-vulnerability-in-ethernet-switches</link>    
  <pubDate>
    Fri, 09 Jan 2026 17:51:24 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2025-15017: Active Debug Code Vulnerability in Serial Device Servers]]></title>
  <description>
    <![CDATA[<p>This security advisory addresses a vulnerability identified in serial device servers.</p>

<p><strong>CVE-2025-15017</strong></p>

<p>A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface.&nbsp;An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality.&nbsp;Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device.&nbsp;No security impact to external or dependent systems has been identified.</p>

<p>Since this issue is considered high severity, users should immediately apply the solutions to mitigate associated security risks.</p>

<p>&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact</strong></p>

<table>
	<thead>
		<tr>
			<th>CVE ID</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-15017</td>
			<td>
			<p>CWE-489: Active Debug Code</p>
			</td>
			<td>CAPEC-121: Exploit Non-Production Interfaces</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>CVE ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-15017</td>
			<td>
			<p>CVSS 4.0: 7.0</p>
			</td>
			<td>
			<p>AV:P/AC:L/AT:N/PR:N/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</p>
			</td>
			<td>High</td>
			<td>No</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257331-cve-2025-15017-active-debug-code-vulnerability-in-serial-device-servers</link>    
  <pubDate>
    Wed, 31 Dec 2025 14:55:36 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2025-1977, CVE-2025-2026: Multiple Vulnerabilities in NPort 6100-G2/6200-G2 Series]]></title>
  <description>
    <![CDATA[<p>This security advisory addresses two vulnerabilities identified in NPort 6100-G2/6200-G2 Series.</p>

<p><strong>CVE-2025-1977</strong></p>

<p>The NPort 6100-G2/6200-G2 Series is affected by an execution with unnecessary privileges vulnerability (CVE-2025-1977) that allows&nbsp;an authenticated user with read-only access to perform unauthorized configuration changes through the MCC&nbsp;(Moxa CLI Configuration)&nbsp;tool.&nbsp;The issue can be exploited remotely over the network with low-attack complexity and no user interaction but requires specific system conditions or configurations to be present. Successful exploitation may result in changes to device settings that were not intended to be permitted for the affected user role, potentially leading to a high impact on the confidentiality, integrity, and availability of the device. No impact on other systems has been identified.</p>

<p><strong>CVE-2025-2026</strong></p>

<p>The NPort 6100-G2/6200-G2 Series is affected by a high-severity vulnerability (CVE-2025-2026) that allows remote attackers to execute a null byte injection through the device&rsquo;s web API. This may lead to an unexpected device reboot and result in a denial-of-service (DoS) condition.</p>

<p>Since these issues have high severity, we strongly advise users to immediately apply the solutions to mitigate associated security risks.<br />
&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact</strong></p>

<table>
	<thead>
		<tr>
			<th style="width: 150px;">CVE ID</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-1977</td>
			<td>
			<p>CWE-250: Execution with Unnecessary Privileges</p>
			</td>
			<td>CAPEC-122: Privilege Abuse</td>
		</tr>
		<tr>
			<td>CVE-2025-2026</td>
			<td>CWE-170: Improper Null Termination</td>
			<td>
			<p>An authenticated remote attacker with web read-only privileges can exploit the vulnerable API to inject malicious input.&nbsp;Successful exploitation may cause the device to reboot, disrupting normal operations and causing a temporary denial of service.</p>
			</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col" style="width: 150px;">
			<p>CVE ID</p>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-1977</td>
			<td>
			<p>CVSS 4.0: 7.7</p>
			</td>
			<td>
			<p>AV:N/AC:L/AT:P/PR:L/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</p>
			</td>
			<td>High</td>
			<td>No</td>
		</tr>
		<tr>
			<td>CVE-2025-2026</td>
			<td>CVSS 4.0: 7.1</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:L/UI:N/</p>

			<p>VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</p>
			</td>
			<td>High</td>
			<td>No</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-251731-cve-2025-1977-cve-2025-2026-multiple-vulnerabilities-in-nport-6100-g2-6200-g2-series</link>    
  <pubDate>
    Wed, 31 Dec 2025 14:36:32 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: SSH Weak Algorithms Supported]]></title>
  <description>
    <![CDATA[<p>The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. (Source: Tenable Nessus)</p>

<p>Since this is a medium severity issue, users can assess their environment and schedule the update during the next maintenance or update cycle.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-259471-security-enhancement-ssh-weak-algorithms-supported</link>    
  <pubDate>
    Fri, 12 Dec 2025 10:22:15 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2025-9315: Unauthenticated Device Registration Vulnerability in MXsecurity Series]]></title>
  <description>
    <![CDATA[<p>This security advisory addresses a&nbsp;vulnerability identified in the&nbsp;&nbsp;MXsecurity Series.</p>

<p><strong>CVE-2025-9315</strong></p>

<p>An unauthenticated device registration vulnerability, caused by Improperly Controlled Modification of Dynamically-Determined Object Attributes, has been identified in the MXsecurity Series. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted JSON payload to the device&#39;s registration endpoint /api/v1/devices/register, allowing the attacker to register unauthorized devices without authentication. Although exploiting this vulnerability has limited modification of data, there is no impact to the confidentiality and availability of the affected device, as well as no loss of confidentiality, integrity, and availability within any subsequent systems.</p>

<p>Because the vulnerability is assessed as medium severity, users are suggested to evaluate their environment and schedule the update in the next maintenance or update cycle.</p>

<p>&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact</strong></p>

<table>
	<thead>
		<tr>
			<th style="width: 150px;">CVE ID</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-9315</td>
			<td>
			<p>CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes</p>
			</td>
			<td>CAPEC-77: Manipulating User-Controlled Variables</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>CVE ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-9315</td>
			<td>
			<p>CVSS 4.0: 6.3</p>
			</td>
			<td>
			<p>AV:N/AC:H/AT:N/PR:N/UI:N/</p>

			<p>VC:N/VI:L/VA:N/SC:N/SI:N/SA:N</p>
			</td>
			<td>Medium</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-252631-cve-2025-9315-unauthenticated-device-registration-vulnerability-in-mxsecurity-series</link>    
  <pubDate>
    Wed, 10 Dec 2025 16:26:19 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: Web Application Potentially Vulnerable to Clickjacking]]></title>
  <description>
    <![CDATA[<p>The remote web server does not set an X-Frame-Options response header or a Content-Security-Policy &#39;frame-ancestors&#39; response header in all content responses. This could expose the site to a clickjacking or UI redress attack, in which an attacker can trick a user into clicking an area of the vulnerable page that is different than what the user perceives the page to be. This can result in a user performing fraudulent or malicious transactions.&nbsp;(Source: Tenable Nessus)</p>

<p>Since this is a medium severity issue, users can assess their environment and schedule the update during the next maintenance or update cycle.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-252213-security-enhancement-web-application-potentially-vulnerable-to-clickjacking</link>    
  <pubDate>
    Thu, 27 Nov 2025 16:22:10 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: Web Server Allows Password Auto-Completion]]></title>
  <description>
    <![CDATA[<p>The remote web server contains at least one HTML form field that has an input of type &#39;password&#39; where &#39;autocomplete&#39; is not set to &#39;off&#39;.&nbsp;While this does not represent a risk to this web server per se, it meansusers who use the affected forms may have their credentials saved in their browsers, which could in turn lead to a loss of confidentiality if any of them use a shared host or if their machine is compromised at some point. (Source: Tenable Nessus)</p>

<p>Because the issue is assessed as low severity, users can evaluate their environments and decide if an update is required.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-252212-security-enhancement-web-server-allows-password-auto-completion</link>    
  <pubDate>
    Thu, 27 Nov 2025 16:05:58 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: Web Server Transmits Cleartext Credentials]]></title>
  <description>
    <![CDATA[<p>The remote web server contains several HTML form fields containing an input of type &#39;password&#39; which transmit their information to a remote web server in cleartext.&nbsp;An attacker eavesdropping on the traffic between a web browser and server may obtain logins and passwords of valid users. (Source: Tenable Nessus)</p>

<p>Because the issue has low severity, users can assess their environments and decide if an update is needed.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-252211-security-enhancement-web-server-transmits-cleartext-credentials</link>    
  <pubDate>
    Thu, 27 Nov 2025 15:57:36 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: SSL/TLS Weak Key Exchange Supported]]></title>
  <description>
    <![CDATA[<p>The device supports SSL/TLS key exchanges that are cryptographically weaker than recommended. Key exchanges must be recommended by IANA and should provide at least 224 bits of security, which translates to a minimum key size of 2048 bits for Diffie Hellman and RSA key exchanges. (Source: Tenable Nessus)</p>

<p>As this issue is assessed as low severity, users may evaluate their environments and decide if updating is required.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241045-security-enhancement-ssl-tls-weak-key-exchange-supported</link>    
  <pubDate>
    Fri, 31 Oct 2025 14:07:30 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2025-1679, CVE-2025-1680: Stored Cross-site Scripting (XSS) and Host Header Injection Vulnerabilities in Ethernet Switch]]></title>
  <description>
    <![CDATA[<p>This security advisory addresses two&nbsp;vulnerabilities identified in&nbsp;Moxa&rsquo;s Ethernet switches.</p>

<p><strong>CVE-2025-1679</strong></p>

<p>Cross-site Scripting&nbsp;has been identified in Moxa&rsquo;s Ethernet switches, which allows an authenticated administrative attacker to inject malicious scripts to an affected device&rsquo;s web service that could impact authenticated users interacting with the device&rsquo;s web interface.&nbsp;This vulnerability is classified as stored cross-site scripting (XSS); attackers inject malicious scripts into the system, and the scripts persist across sessions.&nbsp;There is no impact to the&nbsp;confidentiality,&nbsp;integrity, and&nbsp;availability&nbsp;of the&nbsp;affected&nbsp;device; no loss of&nbsp;availability&nbsp;within any subsequent systems but has some loss of confidentiality and&nbsp;integrity within the subsequent system.</p>

<p><strong>CVE-2025-1680</strong></p>

<p>An acceptance of extraneous untrusted data with trusted data vulnerability has been identified in Moxa&rsquo;s Ethernet switches, which allows attackers with administrative privileges to manipulate HTTP Host headers by injecting a specially crafted Host header into HTTP requests sent to an affected device&rsquo;s web service.&nbsp;This vulnerability is classified as Host Header Injection, where invalid Host headers can manipulate to redirect users, forge links, or phishing attacks.&nbsp;There is no impact to the confidentiality, integrity, and availability of the affected device; no loss of confidentiality, integrity, and availability within any subsequent systems.</p>

<p>Because the issues are assessed as medium to low severity, users can evaluate their environment and schedule the update in the next maintenance or update cycle.</p>

<p>&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact</strong></p>

<table>
	<thead>
		<tr>
			<th style="width: 150px;">CVE ID</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-1679</td>
			<td>
			<p>CWE-79: Improper Neutralization of Input During Web Page Generation (&#39;Cross-site Scripting&#39;)</p>
			</td>
			<td>
			<p>CAPEC-63: Cross-Site Scripting (XSS)</p>
			</td>
		</tr>
		<tr>
			<td>CVE-2025-1680</td>
			<td>
			<p>CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data&nbsp;</p>
			</td>
			<td>
			<p>CAPEC-154: Resource Location Spoofing</p>
			</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>CVE ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-1679</td>
			<td>
			<p>CVSS 4.0: 4.8</p>
			</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:H/UI:P/</p>

			<p>VC:N/VI:N/VA:N/SC:L/SI:L/SA:N</p>
			</td>
			<td>Medium</td>
			<td>No</td>
		</tr>
		<tr>
			<td>CVE-2025-1680</td>
			<td>CVSS 4.0:&nbsp;0.0</td>
			<td>
			<p>AV:N/AC:L/AT:P/PR:L/UI:P/</p>

			<p>VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</p>
			</td>
			<td>Low</td>
			<td>No</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257421-cve-2025-1679,-cve-2025-1680-stored-cross-site-scripting-(xss)-and-host-header-injection-vulnerabilities-in</link>    
  <pubDate>
    Thu, 23 Oct 2025 21:43:27 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: Modbus/TCP Discrete Input Access]]></title>
  <description>
    <![CDATA[<p>Using function code 2, Modbus can read the discrete inputs from a Modbus slave, which is commonly used by SCADA and DCS field devices. Discrete inputs represent binary (i.e boolean) values that often map to switches, relays, or other sensors. A sample of discrete inputs read from the device are provided by the plugin output.&nbsp;The ability to read discrete inputs may help an attacker profile a system. (Source: Tenable Nessus)</p>

<p>As this issue is assessed as medium severity, users may evaluate their environment and schedule the update in the next maintenance or update cycle.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257317-security-enhancement-modbus-tcp-discrete-input-access</link>    
  <pubDate>
    Tue, 21 Oct 2025 18:25:42 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: Modbus/TCP Device Identification]]></title>
  <description>
    <![CDATA[<p>It is possible to send a Modbus Encapsulated Interface read request with MEI type 14 to get the device&#39;s Vendor Name, Product Code, and Major and Minor Revision. If supported, the data can include Vendor URL, Product Name, Model Name, and User Application Name. The alternative is to detect Modbus on valid error responses from a device not supporting the function code 43 and MEI 14. (Source: Tenable Nessus)</p>

<p>As this issue is assessed as medium severity, users may evaluate their environment and schedule the update in the next maintenance or update cycle.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257316-security-enhancement-modbus-tcp-device-identification</link>    
  <pubDate>
    Tue, 21 Oct 2025 18:22:36 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: SNMP Agent Default Community Name (public)]]></title>
  <description>
    <![CDATA[<p>It is very easily possible to obtain the default community name of the remote SNMP server.&nbsp;An attacker may use this information to gain more knowledge about the remote host, or to change the configuration of the remote system (if the default community allows such modifications). (Source: Tenable Nessus)</p>

<p>As this issue is assessed as high severity, users are strongly advised to immediately apply the solutions to mitigate associated security risks.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257315-security-enhancement-snmp-agent-default-community-name-(public)</link>    
  <pubDate>
    Tue, 21 Oct 2025 18:18:07 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: SSH Weak MAC Algorithms Enabled]]></title>
  <description>
    <![CDATA[<p>The remote SSH server is configured to allow either MD5 or 96-bit MAC algorithms, both of which are considered weak. (Source: Tenable Nessus)</p>

<p>As this issue is assessed as low severity, users may evaluate their environments and decide if updating is required.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257314-security-enhancement-ssh-weak-mac-algorithms-enabled</link>    
  <pubDate>
    Tue, 21 Oct 2025 18:10:51 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: SSH Weak Key Exchange Algorithms Enabled]]></title>
  <description>
    <![CDATA[<p>The remote SSH server is configured to allow key exchange algorithms that are considered weak. This is based on the IETF draft document Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH) RFC9142. Section 4 lists guidance on key exchange algorithms that should not and must not be enabled.&nbsp;(Source: Tenable Nessus)</p>

<p>As this issue is assessed as low severity, users may evaluate their environments and decide if updating is required.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257313-security-enhancement-ssh-weak-key-exchange-algorithms-enabled</link>    
  <pubDate>
    Tue, 21 Oct 2025 18:05:37 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: SSH Server CBC Mode Ciphers Enabled]]></title>
  <description>
    <![CDATA[<p>The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext. (Source: Tenable Nessus)</p>

<p>As this issue is assessed as low severity, users may evaluate their environments and decide if updating is required.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257312-security-enhancement-ssh-server-cbc-mode-ciphers-enabled</link>    
  <pubDate>
    Tue, 21 Oct 2025 17:59:37 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: ICMP Timestamp Request Remote Date Disclosure]]></title>
  <description>
    <![CDATA[<p>The product responds to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.&nbsp;(Source: Tenable Nessus)</p>

<p>As this issue is assessed as low severity, users may evaluate their environments and decide if updating is required.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257311-security-enhancement-icmp-timestamp-request-remote-date-disclosure</link>    
  <pubDate>
    Tue, 21 Oct 2025 17:48:11 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2025-6892, CVE-2025-6893, CVE-2025-6894, CVE-2025-6949, CVE-2025-6950: Multiple Vulnerabilities in Network Security Appliances and Routers]]></title>
  <description>
    <![CDATA[<p>This security advisory addresses five&nbsp;vulnerabilities identified in&nbsp;Moxa&rsquo;s network security appliances and routers.</p>

<p><strong>CVE-2025-6892</strong></p>

<p>An Incorrect Authorization vulnerability has been identified in Moxa&rsquo;s network security appliances and routers.&nbsp;A flaw in the API authentication mechanism allows unauthorized access to protected API endpoints, including those intended for administrative functions. This vulnerability can be exploited after a legitimate user has logged in, as the system fails to properly validate session context or privilege boundaries. An attacker may leverage this flaw to perform unauthorized privileged operations.&nbsp;While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.</p>

<p><strong>CVE-2025-6893</strong></p>

<p>An Execution with Unnecessary Privileges vulnerability has been identified in Moxa&rsquo;s network security appliances and routers. A flaw in broken access control has been identified in the /api/v1/setting/data endpoint of the affected device. This flaw allows a low-privileged authenticated user to call the API without the required permissions, thereby gaining the ability to access or modify system configuration data. Successful exploitation may lead to privilege escalation, allowing the attacker to access or modify sensitive system settings. While the overall impact is high, there is no loss of confidentiality or integrity within any subsequent systems.</p>

<p><strong>CVE-2025-6894</strong></p>

<p>An Execution with Unnecessary Privileges vulnerability has been identified in Moxa&rsquo;s network security appliances and routers.&nbsp;A flaw in the API authorization logic of the affected device allows an authenticated, low-privileged user to execute the administrative `ping` function, which is restricted to higher-privileged roles. This&nbsp;vulnerability&nbsp;enables the user to perform internal network reconnaissance, potentially discovering internal hosts or services that would otherwise be inaccessible. Repeated exploitation could lead to minor resource consumption. While the overall impact is limited, it may result in some loss of confidentiality and availability on the affected device. There is no impact on the integrity of the device, and the vulnerability does not affect any subsequent systems.</p>

<p><strong>CVE-2025-6949</strong></p>

<p>An Execution with Unnecessary Privileges vulnerability has been identified in Moxa&rsquo;s network security appliances and routers.&nbsp;A critical authorization flaw in the API allows an authenticated, low-privileged user to create a new administrator account, including accounts with usernames identical to existing users. In certain scenarios, this vulnerability could allow an attacker to gain full administrative control over the affected device, leading to potential account impersonation.&nbsp;While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.</p>

<p><strong>CVE-2025-6950</strong></p>

<p>An Use of Hard-coded Credentials vulnerability has been identified in Moxa&rsquo;s network security appliances and routers.&nbsp;The system employs a hard-coded secret key to sign JSON Web Tokens (JWT) used for authentication. This insecure implementation allows an unauthenticated attacker to forge valid tokens, thereby bypassing authentication controls and impersonating any user. Exploitation of this vulnerability can result in complete system compromise, enabling unauthorized access, data&nbsp;theft, and full administrative control over the affected&nbsp;device.&nbsp;While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.</p>

<p>Given the severity of these vulnerabilities, users are strongly advised to apply the latest firmware updates immediately to mitigate associated security risks.</p>

<p>&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact</strong></p>

<table>
	<thead>
		<tr>
			<th>CVE ID</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-6892</td>
			<td>
			<p>CWE-863:</p>

			<p>Incorrect Authorization</p>
			</td>
			<td>
			<p>CAPEC-39:</p>

			<p>Manipulating Opaque Client-based Data Tokens</p>
			</td>
		</tr>
		<tr>
			<td>CVE-2025-6893</td>
			<td>
			<p>CWE-250:</p>

			<p>Execution with Unnecessary Privileges</p>
			</td>
			<td>
			<p>CAPEC-233:</p>

			<p>Privilege Escalation</p>
			</td>
		</tr>
		<tr>
			<td>CVE-2025-6894</td>
			<td>
			<p>CWE-250:</p>

			<p>Execution with Unnecessary Privileges</p>
			</td>
			<td>
			<p>CAPEC-233:</p>

			<p>Privilege Escalation</p>
			</td>
		</tr>
		<tr>
			<td>CVE-2025-6949</td>
			<td>
			<p>CWE-250:</p>

			<p>Execution with Unnecessary Privileges</p>
			</td>
			<td>
			<p>CAPEC-233:</p>

			<p>Privilege Escalation</p>
			</td>
		</tr>
		<tr>
			<td>CVE-2025-6950</td>
			<td>
			<p>CWE-798:</p>

			<p>Use of Hard-coded Credentials</p>
			</td>
			<td>
			<p>CAPEC-37:</p>

			<p>Retrieve Embedded Sensitive Data&nbsp;</p>
			</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>CVE ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-6892</td>
			<td>
			<p>CVSS:4.0: 8.7</p>
			</td>
			<td>
			<p>AV:N/AC:L/AT:P/PR:N/UI:P/</p>

			<p>VC:H/VI:H/VA:H/SC:N/SI:N/SA:H</p>
			</td>
			<td>High</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2025-6893</td>
			<td>CVSS:4.0: 9.3</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:L/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:N/SI:N/SA:H</p>
			</td>
			<td>Critical</td>
			<td>No</td>
		</tr>
		<tr>
			<td>CVE-2025-6894</td>
			<td>CVSS:4.0: 5.3</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:L/UI:N/</p>

			<p>VC:L/VI:N/VA:L/SC:N/SI:N/SA:N</p>
			</td>
			<td>Medium</td>
			<td>No</td>
		</tr>
		<tr>
			<td>CVE-2025-6949</td>
			<td>CVSS:4.0: 9.3</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:L/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:N/SI:N/SA:H</p>
			</td>
			<td>Critical</td>
			<td>No</td>
		</tr>
		<tr>
			<td>CVE-2025-6950</td>
			<td>CVSS:4.0: 9.9</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:N/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:N/SI:N/SA:H</p>
			</td>
			<td>Critical</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258121-cve-2025-6892,-cve-2025-6893,-cve-2025-6894,-cve-2025-6949,-cve-2025-6950-multiple-vulnerabilities-in-netwo</link>    
  <pubDate>
    Fri, 17 Oct 2025 09:50:17 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: SSH Known Hard Coded Private Keys]]></title>
  <description>
    <![CDATA[<p>The product is running a service that is using a publicly known SSH private key. An attacker may use this key to decrypt intercepted traffic between users and the device. A remote attacker can also perform a man-in-the-middle attack in order to gain access to the system or modify data in transit.&nbsp;</p>

<p>(Source: Tenable Nessus)</p>

<p>&nbsp;</p>

<p>To enhance the security of the product, users should implement appropriate mitigations or solutions to avoid&nbsp;potential security issue.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-251372-security-enhancement-ssh-known-hard-coded-private-keys</link>    
  <pubDate>
    Thu, 09 Oct 2025 11:49:43 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancement: SSL Medium Strength Cipher Suites Supported (SWEET32)]]></title>
  <description>
    <![CDATA[<p>The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to get cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, also known as a &quot;Sweet32&quot; attack.</p>

<p>(Source: CVE-2016-2183)</p>

<p>&nbsp;</p>

<p>To enhance the security of the product, users should implement appropriate mitigations or solutions to avoid potential security issue.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-251371-security-enhancement-ssl-medium-strength-cipher-suites-supported-(sweet32)</link>    
  <pubDate>
    Thu, 09 Oct 2025 11:37:40 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2025-5191: Unquoted Search Path Vulnerability in the Utility for Industrial Computers (Windows)]]></title>
  <description>
    <![CDATA[<p>This security advisory addresses one&nbsp;vulnerability identified in&nbsp;the utility for&nbsp;Moxa&rsquo;s industrial computers <!-- x-tinymce/html -->(Windows).</p>

<p><strong>CVE-2025-5191</strong></p>

<p>An Unquoted Search Path vulnerability has been identified in the utility for Moxa&rsquo;s industrial computers <!-- x-tinymce/html -->(Windows).&nbsp;Due to the unquoted path configuration in&nbsp;the SerialInterfaceService.exe&nbsp;utility, a local attacker with limited privileges could place a malicious executable in a higher-priority directory within the search path. When the Serial Interface service starts, the malicious executable could be run with SYSTEM privileges. Successful exploitation could allow privilege escalation or enable an attacker to maintain persistence on the affected system.&nbsp;While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of&nbsp;confidentiality, integrity, or availability within any subsequent systems.</p>

<p>Given the severity of the vulnerability, users are strongly advised to immediately apply the latest version of the utility that includes a fix for this issue to mitigate associated security risks.</p>

<p>&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact</strong></p>

<table>
	<thead>
		<tr>
			<th>CVE ID</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-5191</td>
			<td>
			<p>CWE-428: Unquoted Search Path or Element</p>
			</td>
			<td>CAPEC-233: Privilege Escalation</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>CVE ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-5191</td>
			<td>
			<p>CVSS:4.0: 7.3</p>
			</td>
			<td>
			<p>AV:L/AC:L/AT:P/PR:L/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</p>
			</td>
			<td>High</td>
			<td>No</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-256421-cve-2025-5191-unquoted-search-path-vulnerability-in-the-utility-for-industrial-computers-(windows)</link>    
  <pubDate>
    Mon, 25 Aug 2025 12:03:32 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2002-20001: Resource Exhaustion Vulnerability in Diffie-Hellman Key Exchange Protocol ]]></title>
  <description>
    <![CDATA[<p paraeid="{00cbfc57-f798-4b75-a339-779126ad2d3e}{167}" paraid="367445599">A resource exhaustion vulnerability, CVE-2002-20001, exists in the implementation of the Diffie-Hellman key exchange protocol.&nbsp;&nbsp;</p>

<p paraeid="{00cbfc57-f798-4b75-a339-779126ad2d3e}{179}" paraid="1744508854">The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys and trigger expensive server-side DHE modular-exponentiation calculations, also known as a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive where a client can require a server to select its largest supported key size. The basic attack scenario requires the client to claim DHE-only communication capabilities, and the server must be configured to permit DHE.&nbsp;</p>

<p paraeid="{00cbfc57-f798-4b75-a339-779126ad2d3e}{221}" paraid="396091109">This vulnerability affects any product or service that accepts DHE cipher suites. To mitigate the risk, Moxa has released solutions for the affected products. We recommend applying the appropriate solutions immediately.&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th>CVE ID</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td style="width: 150px;">CVE-2002-20001</td>
			<td>
			<p paraeid="{c7d921f4-71fa-4aef-bff4-bafffb0c2d84}{53}" paraid="57241624">CWE-400:&nbsp;Uncontrolled Resource Consumption&nbsp;</p>
			</td>
			<td>An attacker can force the server to perform high-cost modular exponentiation operations. This leads to significant CPU usage on the server side, potentially degrading service availability or resulting in a complete denial of service.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>CVE ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td style="width: 150px;">CVE-2002-20001&nbsp;</td>
			<td style="width: 130px;">
			<p>CVSS:3.1: 7.5&nbsp;</p>
			</td>
			<td style="width: 100px;">
			<p>AV:N/AC:L/PR:N/UI:N/S:U/ C:N/I:N/A:H&nbsp;</p>
			</td>
			<td>High&nbsp;</td>
			<td>Yes&nbsp;</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258261-cve-2002-20001-resource-exhaustion-vulnerability-in-diffie-hellman-key-exchange-protocol</link>    
  <pubDate>
    Mon, 02 Jun 2025 17:18:35 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2025-0415: Command Injection Leading to Denial-of-Service in Secure Routers, Cellular Routers, and Network Security Appliances]]></title>
  <description>
    <![CDATA[<p>Multiple Moxa secure routers, cellular routers, and network security appliances are affected by a critical-severity vulnerability, CVE-2025-0415, which could allow an authenticated with administrative access to the web interface to execute arbitrary system commands on affected devices.&nbsp;</p>

<p>To mitigate these risks, Moxa has released solutions for the affected products. It is strongly recommended to update to the latest version as soon as possible.&nbsp;</p>

<p>The identified vulnerability types and potential impacts are listed&nbsp;below:</p>

<table>
	<thead>
		<tr>
			<th style="width: 150px;">CVE ID</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>
			<p>CVE-2025-0415</p>
			</td>
			<td>
			<p>CWE-78: Improper Neutralization of Special Elements used in an OS Command (&#39;OS Command Injection&#39;)</p>
			</td>
			<td>
			<p>A remote attacker with web administrator privileges can exploit the device&rsquo;s web interface to execute arbitrary system commands through the NTP settings. Successful exploitation may result in the device entering an infinite reboot loop, resulting in a complete loss of connectivity for downstream systems that depend on its network services.</p>
			</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-0415</td>
			<td>
			<p>CVSS 4.0: 9.2</p>
			</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:H/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:N/SI:N/SA:H&nbsp;</p>
			</td>
			<td>No</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-259491-cve-2025-0415-command-injection-leading-to-denial-of-service-(dos)</link>    
  <pubDate>
    Wed, 02 Apr 2025 14:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2025-0676: Command Injection Leading to Privilege Escalation in Secure Routers, Cellular Routers, Network Security Appliances]]></title>
  <description>
    <![CDATA[<p>Multiple Moxa secure routers, cellular routers, and network security appliances are affected by a high-severity vulnerability, CVE-2025-0676, which could allow attackers to execute arbitrary systems commands and gain root-level access.&nbsp;</p>

<p>To mitigate these risks, Moxa has released solutions for the affected products. It is strongly recommended to update to the latest version as soon as possible.&nbsp;</p>

<p>The identified vulnerability types and potential impacts are listed&nbsp;below:</p>

<table>
	<thead>
		<tr>
			<th style="width: 150px;">CVE ID</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>
			<p>CVE-2025-0676</p>
			</td>
			<td>
			<p>CWE-78: Improper Neutralization of Special Elements used in an OS Command (&#39;OS Command Injection&#39;)</p>
			</td>
			<td>This vulnerability involves command injection in tcpdump within Moxa products, enabling an authenticated attacker with console access to exploit improper input validation to inject and execute systems commands. Successful exploitation could result in privilege escalation, allowing the attacker to gain root shell access and maintain persistent control over the device, potentially disrupting network services and affecting the availability of downstream systems that rely on its connectivity.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<p>Unauthenticated Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-0676</td>
			<td>
			<p>CVSS 4.0: 8.6</p>
			</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:H/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</p>
			</td>
			<td>No</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-251431-cve-2025-0676-command-injection-leading-to-privilege-escalation</link>    
  <pubDate>
    Wed, 02 Apr 2025 14:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2024-12297: Frontend Authorization Logic Disclosure Vulnerability Identified in PT Switches]]></title>
  <description>
    <![CDATA[<p>Multiple Moxa PT switches are vulnerable to an authentication bypass because of flaws in their authorization mechanism. Despite client-side and back-end server verification, attackers can exploit weaknesses in its implementation. This vulnerability may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>CWE-656: Reliance on Security Through Obscurity (CVE-2024-12297)&nbsp;</p>
			</td>
			<td>Exploitation of this vulnerability could allow attackers to bypass authentication, perform brute-force or MD5 collision attacks, and gain unauthorized access to sensitive configurations or disrupt services.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2024-12297</td>
			<td>
			<p>CVSS 4.0: 9.2</p>
			</td>
			<td>
			<p>AV:N/AC:L/AT:P/PR:N/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:L/SI:L/SA:L</p>
			</td>
			<td>Critical</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241408-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-identified-in-pt-switches</link>    
  <pubDate>
    Thu, 06 Mar 2025 16:20:20 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2024-7695: Out-of-bounds Write Vulnerability Identified in EN 50155 Switches]]></title>
  <description>
    <![CDATA[<p paraeid="{a7ecb31e-1138-4c57-9adf-2a5e285c4f01}{172}" paraid="19404914">EN 50155 Switches are affected by an out-of-bounds write vulnerability. This vulnerability is caused by insufficient input validation, which allows writing data beyond buffer boundaries. Successful exploitation could result in a denial-of-service (DoS) attack.&nbsp;</p>

<p paraeid="{a7ecb31e-1138-4c57-9adf-2a5e285c4f01}{204}" paraid="1425080884">This vulnerability poses a significant remote threat if the affected products are exposed to publicly accessible networks. Attackers could potentially disrupt operations by shutting down the affected systems. Given the severity of this issue, immediate action is strongly recommended to mitigate potential exploitation.&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p paraeid="{87bdd158-4557-427c-94b3-319d8b47f980}{18}" paraid="527684619">Out-of-bounds Write (CWE-787)&nbsp;</p>

			<p paraeid="{87bdd158-4557-427c-94b3-319d8b47f980}{24}" paraid="1847241460">CVE-2024-7695</p>
			</td>
			<td>An out-of-bounds write vulnerability caused by insufficient input validation allows attackers to overwrite memory beyond the buffer&rsquo;s bounds. Successful exploitation of this vulnerability could lead to a denial-of-service (DoS) condition, disrupting normal operations.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td colspan="1" rowspan="2">CVE-2024-7695</td>
			<td>
			<p>CVSS 3.1: 7.5</p>
			</td>
			<td>
			<p>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</p>
			</td>
			<td colspan="1" rowspan="2">High</td>
			<td colspan="1" rowspan="2">Yes</td>
		</tr>
		<tr>
			<td>CVSS 4.0: 8.7</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:N/UI:N/</p>

			<p>VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</p>
			</td>
		</tr>
	</tbody>
</table>

<p>Note: This advisory uses CVSS 3.1 as the standard for determining severity levels. CVSS 4.0 is provided as a reference metric for comparison.&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240164-cve-2024-7695-out-of-bounds-write-vulnerability-identified-in-en-50155-switches</link>    
  <pubDate>
    Sat, 22 Feb 2025 22:34:45 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2024-9404: Denial-of-Service Vulnerability Identified in Multiple PT Switches]]></title>
  <description>
    <![CDATA[<p paraeid="{4c81c752-5a59-412d-8615-7ea548bdfc68}{175}" paraid="2140326462">Multiple PT switches are affected by a high-severity vulnerability, CVE-2024-9404, which could lead to a denial-of-service condition or cause a system or service crash. This vulnerability allows attackers to exploit the Moxa service, commonly referred to as moxa_cmd, originally designed for deployment purposes. Due to insufficient input validation, this service can be exploited to trigger a cold start or denial-of-service condition.&nbsp;</p>

<p paraeid="{4c81c752-5a59-412d-8615-7ea548bdfc68}{201}" paraid="1383420920">This vulnerability poses a significant remote threat if the affected products are exposed to publicly accessible networks. Attackers could potentially disrupt operations by shutting down the affected systems. Given the severity of this issue, immediate action is strongly recommended to mitigate potential exploitation.&nbsp;</p>

<p><strong>The Identified Vulnerability Type and Potential Impact&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>CWE-1287: Improper Validation of Specified Type of Input (CVE-2024-9404)&nbsp;</p>
			</td>
			<td>This vulnerability (CVE-2024-9404) could lead to denial-of-service or service crashes. Exploitation of the moxa_cmd service, because of insufficient input validation, allows attackers to disrupt operations. If exposed to public networks, the vulnerability poses a significant remote threat, potentially allowing attackers to shut down affected systems.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td colspan="1" rowspan="2">CVE-2024-9404</td>
			<td>
			<p>CVSS 3.1: 7.5</p>
			</td>
			<td>
			<p>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</p>
			</td>
			<td colspan="1" rowspan="2">High</td>
			<td colspan="1" rowspan="2">Yes</td>
		</tr>
		<tr>
			<td>CVSS 4.0: 8.7</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:N/UI:N/</p>

			<p>VC:N/VI:N/VA:H/SC:N/SI:N/SA:L</p>
			</td>
		</tr>
	</tbody>
</table>

<p>Note: This advisory uses CVSS 3.1 as the standard for determining severity levels. CVSS 4.0 is provided as a reference metric for comparison.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240933-cve-2024-9404-denial-of-service-vulnerability-identified-in-multiple-pt-switches</link>    
  <pubDate>
    Wed, 19 Feb 2025 21:19:32 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2024-7695: Out-of-bounds Write Vulnerability in Multiple EDS, ICS, IKS, and SDS Switches]]></title>
  <description>
    <![CDATA[<p paraeid="{f9bcfc38-7183-4b5f-a614-c2cc153477c3}{168}" paraid="19404914">Multiple Moxa EDS, ICS, IKS, and SDS switches are affected by an out-of-bounds write vulnerability. This vulnerability is caused by insufficient input validation, which allows writing data beyond buffer boundaries. Successful exploitation could result in a denial-of-service (DoS) attack.</p>

<p paraeid="{f9bcfc38-7183-4b5f-a614-c2cc153477c3}{186}" paraid="1425080884">This vulnerability poses a significant remote threat if the affected products are exposed to publicly accessible networks. Attackers could potentially disrupt operations by shutting down the affected systems. Due to the critical nature of this security risk, we strongly recommend taking immediate action to prevent its potential exploitation.&nbsp;</p>

<p>The Identified Vulnerability Type and Potential Impact&nbsp;</p>

<table>
	<thead>
		<tr>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>
			<p paraeid="{f9bcfc38-7183-4b5f-a614-c2cc153477c3}{255}" paraid="527684619">Out-of-bounds Write (CWE-787)&nbsp;</p>

			<p paraeid="{14c690d2-1477-4eec-a007-4327fbda632a}{6}" paraid="1847241460">CVE-2024-7695&nbsp;</p>
			</td>
			<td>An out-of-bounds write vulnerability caused by insufficient input validation allows attackers to overwrite memory beyond the buffer&rsquo;s bounds. Successful exploitation of this vulnerability could lead to a denial-of-service (DoS) condition, disrupting normal operations.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<p>ID</p>
			</th>
			<th scope="col">
			<p>Base Score</p>
			</th>
			<th scope="col">
			<p>Vector&nbsp;</p>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td colspan="1" rowspan="2">CVE-2024-7695</td>
			<td>
			<p>CVSS 3.1: 7.5</p>
			</td>
			<td>
			<p>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</p>
			</td>
			<td colspan="1" rowspan="2">High</td>
			<td colspan="1" rowspan="2">Yes</td>
		</tr>
		<tr>
			<td>CVSS 4.0: 8.7</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:N/UI:N/</p>

			<p>VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</p>
			</td>
		</tr>
	</tbody>
</table>

<p>Note: This advisory uses CVSS 3.1 as the standard for determining severity levels. CVSS 4.0 is provided as a reference metric for comparison.&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240163-cve-2024-7695-out-of-bounds-write-vulnerability-in-multiple-eds,-ics,-iks,-and-sds-switches</link>    
  <pubDate>
    Fri, 07 Feb 2025 14:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2024-9404: Denial-of-Service Vulnerability Identified in Multiple EDS, ICS, IKS, and SDS Switches]]></title>
  <description>
    <![CDATA[<p paraeid="{f9bcfc38-7183-4b5f-a614-c2cc153477c3}{168}" paraid="19404914">Multiple Moxa EDS, ICS, IKS, and SDS switches are affected by a high-severity vulnerability, CVE-2024-9404, which could lead to a denial-of-service condition or cause a system or service crash. This vulnerability allows attackers to exploit the Moxa service, commonly referred to as moxa_cmd, originally designed for deployment purposes. Due to insufficient input validation, this service can be exploited to trigger a cold start or denial-of-service condition.</p>

<p paraeid="{f9bcfc38-7183-4b5f-a614-c2cc153477c3}{186}" paraid="1425080884">This vulnerability poses a significant remote threat if the affected products are exposed to publicly accessible networks. Attackers could potentially disrupt operations by shutting down the affected systems. Due to the critical nature of this security risk, we strongly recommend taking immediate action to prevent its potential exploitation.&nbsp;</p>

<p>The Identified Vulnerability Type and Potential Impact&nbsp;</p>

<table>
	<thead>
		<tr>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>
			<p paraeid="{f9bcfc38-7183-4b5f-a614-c2cc153477c3}{255}" paraid="527684619">CWE-1287: Improper Validation of Specified Type of Input (CVE-2024-9404)&nbsp;</p>
			</td>
			<td>This vulnerability (CVE-2024-9404) could lead to denial-of-service or service crashes. Exploitation of the moxa_cmd service, because of insufficient input validation, allows attackers to disrupt operations. If exposed to public networks, the vulnerability poses a significant remote threat, potentially allowing attackers to shut down affected systems.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<p>ID</p>
			</th>
			<th scope="col">
			<p>Base Score</p>
			</th>
			<th scope="col">
			<p>Vector&nbsp;</p>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td colspan="1" rowspan="2">CVE-2024-9404</td>
			<td>
			<p>CVSS 3.1: 7.5</p>
			</td>
			<td>
			<p>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</p>
			</td>
			<td colspan="1" rowspan="2">High</td>
			<td colspan="1" rowspan="2">Yes</td>
		</tr>
		<tr>
			<td>CVSS 4.0: 8.7</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L</p>
			</td>
		</tr>
	</tbody>
</table>

<p>Note: This advisory uses CVSS 3.1 as the standard for determining severity levels. CVSS 4.0 is provided as a reference metric for comparison.&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240931-cve-2024-9404-denial-of-service-vulnerability-identified-in-multiple-eds,-ics,-iks,-and-sds-switches</link>    
  <pubDate>
    Fri, 07 Feb 2025 14:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2024-7695: Out-of-bounds Write Vulnerability Identified in Multiple PT Switches]]></title>
  <description>
    <![CDATA[<p paraeid="{f9bcfc38-7183-4b5f-a614-c2cc153477c3}{168}" paraid="19404914">Multiple PT switches are affected by an out-of-bounds write vulnerability. This vulnerability is caused by insufficient input validation, which allows data to be written to memory outside the bounds of the buffer. Successful exploitation of this vulnerability could result in a denial-of-service attack.&nbsp;</p>

<p paraeid="{f9bcfc38-7183-4b5f-a614-c2cc153477c3}{186}" paraid="1425080884">This vulnerability poses a significant remote threat if the affected products are exposed to publicly accessible networks. Attackers could potentially disrupt operations by shutting down the affected systems. Due to the critical nature of this security risk, we strongly recommend taking immediate action to prevent its potential exploitation.&nbsp;</p>

<p>The Identified Vulnerability Type and Potential Impact&nbsp;</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p paraeid="{f9bcfc38-7183-4b5f-a614-c2cc153477c3}{255}" paraid="527684619">Out-of-bounds Write (CWE-787)&nbsp;</p>

			<p paraeid="{14c690d2-1477-4eec-a007-4327fbda632a}{6}" paraid="1847241460">CVE-2024-7695&nbsp;</p>
			</td>
			<td>An out-of-bounds write vulnerability caused by insufficient input validation allows attackers to overwrite memory beyond the buffer&rsquo;s bounds. Successful exploitation of this vulnerability could lead to a denial-of-service (DoS) condition, disrupting normal operations.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector&nbsp;</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td colspan="1" rowspan="2">CVE-2024-7695</td>
			<td>
			<p>CVSS 3.1: 7.5</p>
			</td>
			<td>
			<p>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</p>
			</td>
			<td colspan="1" rowspan="2">High</td>
			<td colspan="1" rowspan="2">Yes</td>
		</tr>
		<tr>
			<td>CVSS 4.0: 8.7</td>
			<td>
			<div>AV:N/AC:L/AT:N/PR:N/UI:N/</div>

			<div>VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</div>
			</td>
		</tr>
	</tbody>
</table>

<p>Note: This advisory uses CVSS 3.1 as the standard for determining severity levels. CVSS 4.0 is provided as a reference metric for comparison.&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240162-cve-2024-7695-out-of-bounds-write-vulnerability-identified-in-multiple-pt-switches</link>    
  <pubDate>
    Wed, 29 Jan 2025 15:11:32 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2024-9137: Missing Authentication Vulnerability in Ethernet Switches]]></title>
  <description>
    <![CDATA[<p>Moxa&rsquo;s Ethernet switches are affected by a critical vulnerability, CVE-2024-9137, which could result in unauthorized access and system compromise. This vulnerability allows attackers to manipulate device configurations without requiring authentication. Given the significant security risks, immediate action is strongly recommended to mitigate potential exploitation.</p>

<p><br />
The identified vulnerability types and potential impacts are listed&nbsp;below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>CWE-306: Missing Authentication for Critical Function (CVE-2024-9137)</p>
			</td>
			<td>The affected product lacks an authentication check when sending commands to the server via the Moxa service. This vulnerability allows an attacker to execute specified commands, potentially leading to unauthorized downloads or uploads of configuration files and system compromise.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table class="border-table" style="width: 100%;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 150px; text-align: left;">ID</th>
			<th class="border-table__th" style="width: 100px; text-align: left;">Base Score</th>
			<th class="border-table__th" style="width: 363px; text-align: left;">Vector</th>
			<th class="border-table__th" style="width: 100px; text-align: left;">Unauthenticated Remote Exploits</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td rowspan="2" style="vertical-align: top;">CVE-2024-9137</td>
			<td style="vertical-align: top;">CVSS 3.1: 9.4</td>
			<td style="vertical-align: top;">
			<p>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H</p>
			</td>
			<td rowspan="2" style="vertical-align: top;">Yes</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td>CVSS 4.0: 8.8</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N</p>
			</td>
		</tr>
	</tbody>
</table>

<p>Note: This advisory uses CVSS 3.1 as the standard for determining severity levels. CVSS 4.0 is provided as a reference metric for comparison.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241156-cve-2024-9137-missing-authentication-vulnerability-in-ethernet-switches</link>    
  <pubDate>
    Fri, 17 Jan 2025 08:24:28 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2025-0193: Stored Cross-site Scripting (XSS) Vulnerability in the MGate 5121/5122/5123 Series]]></title>
  <description>
    <![CDATA[<p>A stored Cross-site Scripting (XSS) vulnerability exists in the MGate 5121/5122/5123 Series firmware version v1.0 because of insufficient sanitization and encoding of user input in the &quot;Login Message&quot; functionality. An authenticated attacker with administrative access can exploit this vulnerability to inject malicious scripts that are continuously stored on the device. These scripts are executed when other users access the login page, potentially resulting in unauthorized actions or other impacts, depending on the user&#39;s privileges.&nbsp;</p>

<p><br />
The Identified Vulnerability Type and Potential Impact&nbsp;</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>CWE-79: Improper Neutralization of Input During Web Page Generation (&#39;Cross-site Scripting&#39;) (CVE-2025-0193)&nbsp;</p>
			</td>
			<td>Exploitation of this vulnerability may result in unauthorized actions or other impacts, depending on the user&#39;s privileges.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>CVSS</div>
			</th>
			<th scope="col">
			<div>Vector&nbsp;</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploit</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2025-0193&nbsp;</td>
			<td>
			<p>CVSS 4.0: 5.2</p>
			</td>
			<td>
			<div>AV:N/AC:H/AT:N/PR:H/UI:P/</div>

			<div>VC:N/VI:N/VA:N/SC:H/SI:H/SA:H&nbsp;</div>
			</td>
			<td>Medium</td>
			<td>No</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-247733-cve-2025-0193-stored-cross-site-scripting-(xss)-vulnerability-in-the-mgate-5121-5122-5123-series</link>    
  <pubDate>
    Wed, 15 Jan 2025 18:48:09 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2024-12297: Frontend Authorization Logic Disclosure Vulnerability in EDS-508A Series]]></title>
  <description>
    <![CDATA[<p>Moxa&rsquo;s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.</p>

<p><br />
The identified vulnerability types and potential impacts are listed&nbsp;below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>CWE-656: Reliance on Security Through Obscurity (CVE-2024-12297)</p>
			</td>
			<td>Exploitation of this vulnerability could allow attackers to bypass authentication, perform brute-force or MD5 collision attacks, and gain unauthorized access to sensitive configurations or disrupt services.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<p>Unauthenticated Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2024-12297</td>
			<td>
			<p>9.2</p>
			</td>
			<td>
			<p>AV:N/AC:L/AT:P/PR:N/UI:N/</p>

			<p>VC:H/VI:H/VA:H/SC:L/SI:L/SA:L</p>
			</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241407-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-in-eds-508a-series</link>    
  <pubDate>
    Wed, 15 Jan 2025 14:30:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancements for PT-7528/7728/7828 Series – SNMP, Telnet, and SSL Certificate]]></title>
  <description>
    <![CDATA[<p>To enhance the security of the product, users of PT-7528/7728/7828 Series should implement the mitigations described in <a href="https://cdn-cms.azureedge.net/getmedia/fb034550-40ce-4f8e-aa39-d141d8a51aab/moxa-managed-ethernet-switch-pt-7528-7728-7828-manual-v9.9.pdf" rel="noreferrer noopener" target="_blank">User Manuel v9.9</a> to avoid the following security issues:&nbsp;</p>

<div paraeid="{cbee6504-644d-4bd4-9e04-fb1d230b4030}{243}" paraid="123444307"><strong>SNMP&nbsp;</strong></div>

<div paraeid="{cbee6504-644d-4bd4-9e04-fb1d230b4030}{243}" paraid="123444307">&nbsp;</div>

<ul role="list">
	<li aria-setsize="-1" data-aria-level="2" data-aria-posinset="1" data-font="Courier New" data-leveltext="o" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-listid="6" role="listitem">
	<div paraeid="{cbee6504-644d-4bd4-9e04-fb1d230b4030}{249}" paraid="1444932682">SNMP Agent Default Community Name (public)&nbsp;</div>
	</li>
	<li aria-setsize="-1" data-aria-level="2" data-aria-posinset="1" data-font="Courier New" data-leveltext="o" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-listid="6" role="listitem">
	<div paraeid="{cbee6504-644d-4bd4-9e04-fb1d230b4030}{249}" paraid="1444932682">SNMP &lsquo;GETBULK&rsquo; Reflection DDoS&nbsp;</div>
	</li>
</ul>

<div paraeid="{037e2215-1958-4721-a196-5b0b20116a5c}{6}" paraid="857666517"><strong>Telnet&nbsp;</strong></div>

<div paraeid="{037e2215-1958-4721-a196-5b0b20116a5c}{6}" paraid="857666517">&nbsp;</div>

<ul role="list">
	<li aria-setsize="-1" data-aria-level="2" data-aria-posinset="1" data-font="Courier New" data-leveltext="o" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-listid="6" role="listitem">
	<div paraeid="{037e2215-1958-4721-a196-5b0b20116a5c}{12}" paraid="1798757559">Unencrypted Telnet Server&nbsp;</div>
	</li>
</ul>

<div paraeid="{037e2215-1958-4721-a196-5b0b20116a5c}{18}" paraid="1795886377"><strong>SSL Certificate&nbsp;</strong></div>

<div paraeid="{037e2215-1958-4721-a196-5b0b20116a5c}{18}" paraid="1795886377">&nbsp;</div>

<ul role="list">
	<li aria-setsize="-1" data-aria-level="2" data-aria-posinset="1" data-font="Courier New" data-leveltext="o" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-listid="6" role="listitem">
	<div paraeid="{037e2215-1958-4721-a196-5b0b20116a5c}{24}" paraid="268265819">SSL Certificate Cannot Be Trusted&nbsp;</div>
	</li>
	<li aria-setsize="-1" data-aria-level="2" data-aria-posinset="1" data-font="Courier New" data-leveltext="o" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-listid="6" role="listitem">
	<div paraeid="{037e2215-1958-4721-a196-5b0b20116a5c}{24}" paraid="268265819">SSL Certificate Chain Contains RSA Keys Less Than 2048 Bits&nbsp;</div>
	</li>
</ul>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-242721-security-enhancements-for-pt-7528-7728-7828-series-–-snmp,-telnet,-and-ssl-certificate</link>    
  <pubDate>
    Thu, 09 Jan 2025 19:12:59 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Privilege Escalation and OS Command Injection Vulnerabilities in Cellular Routers, Secure Routers, and Network Security Appliances]]></title>
  <description>
    <![CDATA[<p>Moxa&rsquo;s cellular routers, secure routers, and network security appliances are affected by two critical vulnerabilities that pose a significant security risk.</p>

<ul>
	<li><strong>CVE-2024-9138</strong>: This vulnerability involves hard-coded credentials, which could allow an authenticated user to escalate privileges and gain root-level access to the system.</li>
	<li><strong>CVE-2024-9140</strong>: This vulnerability allows attackers to exploit special characters to bypass input restrictions, potentially leading to unauthorized command execution.</li>
</ul>

<p>Immediate action is strongly recommended to prevent potential exploitation and mitigate these risks.</p>

<p>The identified vulnerability types and potential impacts are listed&nbsp;below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>CWE-656: Reliance on Security Through Obscurity (CVE-2024-9138)</p>
			</td>
			<td>Exploitation of hard-coded credentials could allow an authenticated user to gain root-level access, leading to system compromise, unauthorized modifications, data exposure, or service disruption.</td>
		</tr>
		<tr>
			<td>2</td>
			<td>CWE-78: Improper Neutralization of Special Elements used in an OS Command (&lsquo;OS Command Injection&rsquo;) (CVE-2024-9140)</td>
			<td>The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary code.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th>ID</th>
			<th>Base Score</th>
			<th>Vector</th>
			<th>Unauthenticated Remote Exploits</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td rowspan="2">CVE-2024-9138</td>
			<td>CVSS 3.1: 7.2</td>
			<td>
			<p>AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</p>

			<p>&nbsp;</p>
			</td>
			<td rowspan="2" style="text-align: center;">No</td>
		</tr>
		<tr>
			<td>CVSS 4.0: 8.6</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</p>

			<p>&nbsp;</p>
			</td>
		</tr>
		<tr>
			<td rowspan="2">CVE-2024-9140</td>
			<td>CVSS 3.1: 9.8</td>
			<td>
			<p>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</p>
			</td>
			<td rowspan="2" style="text-align: center;">Yes</td>
		</tr>
		<tr>
			<td>CVSS 4.0: 9.3</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</p>
			</td>
		</tr>
	</tbody>
</table>

<p>Note: This advisory uses CVSS 3.1 as the standard for determining severity levels. CVSS 4.0 is provided as a reference metric for comparison.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241155-privilege-escalation-and-os-command-injection-vulnerabilities-in-cellular-routers,-secure-routers,-and-netwo</link>    
  <pubDate>
    Fri, 03 Jan 2025 14:28:46 GMT
  </pubDate>
</item><item>
  <title><![CDATA[TN-G4500 Series Cryptographic Algorithm Security Enhancement]]></title>
  <description>
    <![CDATA[<p><strong>Security Enhancement</strong></p>

<p>TN-G4500 Series has enhanced its cryptographic algorithm and cipher suite.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-244123-tn-g4500-series-cryptographic-algorithm-security-enhancement</link>    
  <pubDate>
    Mon, 30 Dec 2024 09:39:37 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CVE-2024-9404: Denial-of-Service Vulnerability Identified in the VPort 07-3 Series]]></title>
  <description>
    <![CDATA[<p>Moxa&rsquo;s IP Cameras are affected by a medium-severity vulnerability, CVE-2024-9404, which could lead to a denial-of-service condition or cause a service crash. This vulnerability allows attackers to exploit the Moxa service, commonly referred to as moxa_cmd, originally designed for deployment. Because of insufficient input validation, this service may be manipulated to trigger a denial-of-service.</p>

<p>This vulnerability poses a significant remote threat if the affected products are exposed to publicly accessible networks. Attackers could potentially disrupt operations by shutting down the affected systems. Due to the critical nature of this security risk, we strongly recommend taking immediate action to prevent potential exploitation.</p>

<p><br />
<strong>The Identified Vulnerability Type&nbsp;and Potential Impact</strong></p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>CWE-1287: Improper Validation of Specified Type of Input (CVE-2024-9404)</p>
			</td>
			<td>This vulnerability could lead to denial-of-service or service crashes. Exploitation of the moxa_cmd service, because of insufficient input validation, allows attackers to disrupt operations. If exposed to public networks, the vulnerability poses a significant remote threat, potentically allowing attackers to shut down affected systems.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table class="border-table" style="width: 100%;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 150px; text-align: left;">ID</th>
			<th class="border-table__th" style="width: 100px; text-align: left;">Base Score</th>
			<th class="border-table__th" style="width: 363px; text-align: left;">Vector</th>
			<th class="border-table__th" style="width: 100px; text-align: left;">Unauthenticated Remote Exploits</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td rowspan="2" style="vertical-align: top;">CVE-2024-9404</td>
			<td style="vertical-align: top;">CVSS 4.0: 6.9</td>
			<td style="vertical-align: top;">
			<p>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</p>
			</td>
			<td rowspan="2" style="vertical-align: top;">Yes</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td>CVSS 3.1: 5.3</td>
			<td>
			<p>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</p>
			</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240930-cve-2024-9404-denial-of-service-vulnerability-identified-in-the-vport-07-3-series</link>    
  <pubDate>
    Wed, 04 Dec 2024 11:30:39 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Security Enhancements in the EDS-P510 Series - Modbus/TCP Access, Device Identification, and Unencrypted Telnet Server]]></title>
  <description>
    <![CDATA[<p>The EDS-P510 Series has been enhanced to address several key vulnerabilities:</p>

<ol>
	<li>Modbus/TCP Coil Access: Attackers could read and analyze coil settings, which may allow them to alter device functions in SCADA and DCS environments.</li>
	<li>Modbus/TCP Device Identification: Attackers could retrieve device details via Modbus MEI read requests, potentially exposing Vendor Name, Product Code, and other identifying information.</li>
	<li>Unencrypted Telnet Server: Using Telnet over an unencrypted channel can expose sensitive information, such as credentials, to interception. SSH is recommended as a secure alternative.</li>
</ol>

<p>These updates aim to improve the EDS-P510 Series&rsquo; resilience against vulnerabilities, thereby enhancing its overall security.</p>

<p><br />
<strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">Vulnerability</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<p>Unauthenticated Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>
			<p>Modbus/TCP Device Identification</p>
			</td>
			<td>
			<p>CVSS 3.1: 5.8</p>
			</td>
			<td>
			<p>AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N</p>
			</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>Modbus/TCP Coil Access</td>
			<td>CVSS 3.1: 5.3</td>
			<td>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>
			<p>Unencrypted Telnet Server</p>
			</td>
			<td>
			<p>CVSS 3.1: 6.5</p>
			</td>
			<td>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241021-vulnerability-identified-in-the-eds-p510-series-modbustcp,-device-identification,-and-unencrypted-telnet</link>    
  <pubDate>
    Fri, 08 Nov 2024 08:11:56 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Vulnerabilities Identified in MDS-G4028-L3 Series and EDS-G512E - SSH Prefix Truncation, EOL Nginx Software, and Weak SSL/TLS Key Exchange]]></title>
  <description>
    <![CDATA[<p>The MDS-G4028-L3 series and EDS-G512E series are affected by vulnerabilities that pose potential security risks. The MDS-G4028-L3 series is vulnerable to CVE-2023-48795, which could allow unauthorized access, as well as an outdated version of Nginx (CVE-2021-23017, CVE-2021-3618, and CVE-2019-20372), exposing it to unpatched threats. The EDS-G512E series is impacted by a weak SSL/TLS key exchange, which could compromise encrypted communications and potentially allow data interception.</p>

<p><br />
The identified vulnerability types and potential impacts are listed&nbsp;below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>CWE-354 Improper Validation of Integrity Check Value (CVE-2023-48795)</p>
			</td>
			<td>Integrity checks usually use a secret key that helps authenticate the data origin. Skipping integrity checking generally opens up the possibility that new data from an invalid source can be injected.</td>
		</tr>
		<tr>
			<td>2</td>
			<td>CWE-193 Off-by-one Error (CVE-2021-23017)</td>
			<td>This weakness will generally lead to undefined behavior and therefore crashes. In the case of overflows involving loop index variables, the likelihood of infinite loops is also high.</td>
		</tr>
		<tr>
			<td>3</td>
			<td>CWE-295 Improper Certificate Validation (CVE-2021-3618)</td>
			<td>Bypass protection mechanism or gain privileges or assume identity.</td>
		</tr>
		<tr>
			<td>4</td>
			<td>CWE-444 Inconsistent Interpretation of HTTP Requests (&lsquo;HTTP Request/Response Smuggling&rsquo;) (CVE-2019-20372)</td>
			<td>An attacker could create HTTP messages to exploit a number of weaknesses including 1) the message can trick the web server to associate a URL with another URL&#39;s webpage and caching the contents of the webpage (web cache poisoning attack), 2) the message can be structured to bypass the firewall protection mechanisms and gain unauthorized access to a web application, and 3) the message can invoke a script or a page that returns client credentials (similar to a Cross Site Scripting attack).</td>
		</tr>
		<tr>
			<td>5</td>
			<td>CWE-326: Inadequate Encryption Strength</td>
			<td>An attacker may be able to decrypt the data using brute force attacks.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>Base Score</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<p>Unauthenticated Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2023-48795</td>
			<td>
			<p>5.9</p>
			</td>
			<td>
			<p>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</p>
			</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2021-23017</td>
			<td>7.7</td>
			<td>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2021-3618</td>
			<td>7.4</td>
			<td>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2019-20372</td>
			<td>5.3</td>
			<td>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241044-vulnerabilities-identified-in-mds-g4028-l3-series-and-eds-g512e</link>    
  <pubDate>
    Mon, 04 Nov 2024 09:06:29 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Multiple Moxa Ethernet Switches Affected by CVE-2023-48795 and CVE-2019-20372]]></title>
  <description>
    <![CDATA[<p>Multiple Moxa Ethernet switches are affected by the CVE-2023-48795 and CVE-2019-20372 vulnerabilities. These vulnerabilities pose potential security risks that could impact the integrity and functionality of the affected products.&nbsp;</p>

<p><br />
The identified vulnerability types and potential impacts are listed&nbsp;below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>Improper Validation of Integrity Check Value (CWE-354)&nbsp;</p>

			<p>CVE-2023-48795</p>
			</td>
			<td>This can allow a remote, man-in-the-middle attacker to bypass integrity checks and downgrade the connection&#39;s security.</td>
		</tr>
		<tr>
			<td>2</td>
			<td>
			<p>Inconsistent Interpretation of HTTP Requests (&lsquo;HTTP Request/Response Smuggling&rsquo;) (CWE-444)</p>

			<p>CVE-2019-20372</p>
			</td>
			<td>This can allow HTTP request smuggling, leading to unauthorized access to web pages, bypassing security controls, and potential for further attacks.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>CVSS</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<p>Unauthenticated Remote Exploits</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2023-48795</td>
			<td>
			<p>5.9</p>
			</td>
			<td>
			<p>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</p>
			</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2019-20372</td>
			<td>5.3</td>
			<td>
			<p>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</p>
			</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-244252-multiple-moxa-ethernet-switches-affected-by-cve-2023-48795-and-cve-2019-20372</link>    
  <pubDate>
    Fri, 01 Nov 2024 08:47:52 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NE-4100 Series and MiiNePort Series Affected by CVE-2016-9361]]></title>
  <description>
    <![CDATA[<p>This security advisory addresses CVE-2016-9361 affecting the NE-4100 Series, MiiNePort E1 Series, MiiNePort E2 Series, and MiiNePort E3 Series. The vulnerability allows an attacker to retrieve administration passwords without proper authentication. This flaw potentially compromises the security of the affected devices by enabling unauthorized access to administrative controls, allowing malicious actors to alter configurations or disrupt operations.</p>

<p><strong>The Identified Vulnerability Type and Potential Impact</strong></p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>Improper Authentication (CWE-287)</p>

			<p>CVE-2016-9361</p>
			</td>
			<td>The administration passwords can be retried without authenticating</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>CVSS v3.0&nbsp;</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploit</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2016-9361</td>
			<td>
			<p>9.8</p>
			</td>
			<td>
			<p>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</p>
			</td>
			<td>Critical</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241661-ne-4100-series-and-miineport-series-affected-by-cve-2016-9361</link>    
  <pubDate>
    Mon, 21 Oct 2024 21:44:38 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MXsecurity Series Multiple Vulnerabilities ]]></title>
  <description>
    <![CDATA[<p>MXsecurity Series version 1.1.0 and prior are affected by two vulnerabilities.&nbsp;&nbsp;</p>

<p paraeid="{3b4cd608-019e-444b-a4f8-f2b934897d13}{72}" paraid="1023238016"><strong>CVE-2024-4739&nbsp;</strong></p>

<p paraeid="{3b4cd608-019e-444b-a4f8-f2b934897d13}{78}" paraid="33993528">The lack of access restriction to a resource from unauthorized users makes MXsecurity software versions v1.1.0 and prior vulnerable. By acquiring a valid authenticator, an attacker can pose as an authorized user and successfully access the resource.&nbsp;</p>

<p paraeid="{3b4cd608-019e-444b-a4f8-f2b934897d13}{100}" paraid="1104529584"><strong>CVE-2024-4740&nbsp;</strong></p>

<p paraeid="{3b4cd608-019e-444b-a4f8-f2b934897d13}{106}" paraid="825703796">MXsecurity software versions v1.1.0 and prior are vulnerable because of the use of hard-coded credentials. This vulnerability could allow an attacker to tamper with sensitive data.&nbsp;</p>

<p>The identified vulnerability types and potential impacts are shown below:&nbsp;</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p paraeid="{3b4cd608-019e-444b-a4f8-f2b934897d13}{161}" paraid="623129411">Exposed Dangerous Method or Function (CWE-749)&nbsp;</p>

			<p paraeid="{3b4cd608-019e-444b-a4f8-f2b934897d13}{175}" paraid="1847241460">CVE-2024-4739&nbsp;</p>
			</td>
			<td>An attacker could gain access to the resource.&nbsp;</td>
		</tr>
		<tr>
			<td>2</td>
			<td>
			<p paraeid="{3b4cd608-019e-444b-a4f8-f2b934897d13}{209}" paraid="1279316802">Use of Hard-coded Credentials (CWE-798)&nbsp;</p>

			<p paraeid="{3b4cd608-019e-444b-a4f8-f2b934897d13}{225}" paraid="950629408">CVE-2024-4740&nbsp;</p>
			</td>
			<td>An attacker could tamper with sensitive data.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>CVSS v3.1</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploit</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2024-4739</td>
			<td>
			<p>5.3</p>
			</td>
			<td>
			<p><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</a></p>
			</td>
			<td>Medium</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2024-4740</td>
			<td>5.3</td>
			<td><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</a></td>
			<td>Medium</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-231878-mxsecurity-series-multiple-vulnerabilities</link>    
  <pubDate>
    Fri, 18 Oct 2024 15:56:21 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Missing Authentication and OS Command Injection Vulnerabilities in Cellular Routers, Secure Routers, and Network Security Appliances]]></title>
  <description>
    <![CDATA[<p>Moxa&rsquo;s cellular routers, secure routers, and network security appliances are affected by two critical vulnerabilities that could lead to unauthorized access and system compromise. The first vulnerability, CVE-2024-9137, allows attackers to manipulate device configurations without authentication. The second vulnerability, CVE-2024-9139, permits OS command injection through improperly restricted commands, potentially enabling attackers to execute arbitrary codes. These vulnerabilities pose a significant security risk, and it is highly recommended to take immediate action in order to prevent potential exploitation.</p>

<p><br />
The identified vulnerability types and potential impacts are listed below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>CWE-306: Missing Authentication for Critical Function</p>

			<p>(CVE-2024-9137)</p>
			</td>
			<td>The affected product lacks an authentication check when sending commands to the server via the Moxa service. This vulnerability allows an attacker to execute specified commands, potentially leading to unauthorized downloads or uploads of configuration files and system compromise.</td>
		</tr>
		<tr>
			<td>2</td>
			<td>
			<p>CWE-78: Improper Neutralization of Special Elements used in an OS Command (&#39;OS Command Injection&#39;)</p>

			<p>(CVE-2024-9139)</p>
			</td>
			<td>The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary code.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table class="border-table" style="width: 100%;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 150px; text-align: left;">ID</th>
			<th class="border-table__th" style="width: 100px; text-align: left;">CVSS</th>
			<th class="border-table__th" style="width: 363px; text-align: left;">Vector</th>
			<th class="border-table__th" style="width: 100px; text-align: left;">Unauthenticated Remote Exploits</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td rowspan="2" style="vertical-align: top;">CVE-2024-9137</td>
			<td style="vertical-align: top;">CVSS 3.1: 9.4</td>
			<td style="vertical-align: top;">AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H</td>
			<td rowspan="2" style="vertical-align: top;">Yes</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td>CVSS 4.0: 8.8</td>
			<td>AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td rowspan="2" style="vertical-align: top;">CVE-2024-9139</td>
			<td style="vertical-align: top;">CVSS 3.1: 7.2</td>
			<td style="vertical-align: top;">AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</td>
			<td rowspan="2" style="vertical-align: top;">No</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td>CVSS 4.0: 8.6</td>
			<td>AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241154-missing-authentication-and-os-command-injection-vulnerabilities-in-routers-and-network-security-appliances</link>    
  <pubDate>
    Mon, 14 Oct 2024 15:28:57 GMT
  </pubDate>
</item><item>
  <title><![CDATA[TN-5900 Series Affected by Multiple OpenSSL Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>This security advisory addresses multiple OpenSSL vulnerabilities affecting the TN-5900 Series, specifically CVE-2022-4304, CVE-2023-0215, and CVE-2023-0286. These vulnerabilities pose significant security risks, including potential plaintext recovery through timing-based side-channel attacks, improper memory management leading to memory corruption, and type confusion vulnerabilities that could allow unauthorized memory access or denial of service attacks.</p>

<p><br />
<strong>The Identified Vulnerability Type and Potential Impact</strong></p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<div>Observable Discrepancy (CWE-203)</div>

			<div>CVE-2022-4304</div>
			</td>
			<td>After a sufficiently large number of messages, the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.</td>
		</tr>
		<tr>
			<td>2</td>
			<td>
			<p>Use After Free (CWE-416)</p>
			CVE-2023-0215</td>
			<td>If the caller then calls BIO_pop() on the BIO, a use-after-free will occur. This will most likely result in a crash.</td>
		</tr>
		<tr>
			<td>3</td>
			<td>
			<p>Access of Resource Using Incompatible Type (&#39;Type Confusion&#39;) (CWE-843)</p>
			CVE-2023-0286</td>
			<td>This vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<p>Base</p>

			<p>Score</p>
			</th>
			<th scope="col">
			<div>CVSS:3.1 Vector</div>
			</th>
			<th scope="col">Severity</th>
			<th scope="col">
			<p>Unauthenticated</p>

			<p>Remote Exploit</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2022-4304</td>
			<td>
			<p>5.9</p>
			</td>
			<td>
			<p>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</p>
			</td>
			<td>Medium</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2023-0215</td>
			<td>7.5</td>
			<td>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</td>
			<td>High</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2023-0286</td>
			<td>7.4</td>
			<td>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H</td>
			<td>High</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230405-tn-5900-series-affected-by-multiple-openssl-vulnerabilities</link>    
  <pubDate>
    Fri, 04 Oct 2024 18:41:22 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Multiple Vulnerabilities in MXview One and MXview One Central Manager Series]]></title>
  <description>
    <![CDATA[<p>The impact of CVE-2024-6785, CVE-2024-6786, and CVE-2024-6787 vulnerabilities is detailed in this advisory. These vulnerabilities lead to various attacks, including the exposure of local credentials and arbitrary file writing to the system via the Message Queuing Telemetry Transport (MQTT) protocol. The affected products are MXview One and MXview One Central Manager Series. </p>

<p>The identified vulnerability types and potential impacts are listed below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 100%;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="text-align: left;">Item</th>
			<th class="border-table__th" style="text-align: left;">Vulnerability Type</th>
			<th class="border-table__th" style="text-align: left;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">CWE-313: Cleartext Storage in a File or on Disk (*CVE-2024-6785)</td>
			<td style="vertical-align: top;">The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused because of sensitive information exposure.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">CWE-24: Path Traversal: &lsquo;../filedir&rsquo; (*CVE-2024-6786)</td>
			<td style="vertical-align: top;">The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition (*CVE-2024-6787)</td>
			<td style="vertical-align: top;">This vulnerability occurs when an attacker exploits a race condition between the time a file is checked and the time it is used (TOCTOU). By exploiting this race condition, an attacker can write arbitrary files to the system. This could allow the attacker to execute malicious code and potentially cause file losses.</td>
		</tr>
	</tbody>
</table>
</div>

<p>Note: An asterisk (*) in the table above indicates newly assigned Common Vulnerabilities and Exposures (CVE) identifiers.</p>

<p><strong>Vulnerability Scoring Details</strong></p>

<div class="module-block__table">
<table class="border-table" style="width: 100%;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="text-align: left;">ID</th>
			<th class="border-table__th" style="text-align: left;">Base Score</th>
			<th class="border-table__th" style="text-align: left;">Vector</th>
			<th class="border-table__th" style="text-align: left;">Unauthenticated Remote Exploits</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td rowspan="2" style="vertical-align: top;">CVE-2024-6785</td>
			<td style="vertical-align: top;">CVSS 3.1: 5.5</td>
			<td style="vertical-align: top;"><a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</a></td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">CVSS 4.0: 6.8</td>
			<td style="vertical-align: top;"><a href="https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N">AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N</a></td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td rowspan="2" style="vertical-align: top;">CVE-2024-6786</td>
			<td style="vertical-align: top;">CVSS 3.1: 6.5</td>
			<td style="vertical-align: top;"><a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N">AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</a></td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">CVSS 4.0: 6.0</td>
			<td style="vertical-align: top;"><a href="https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N">AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</a></td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td rowspan="2" style="vertical-align: top;">CVE-2024-6787</td>
			<td style="vertical-align: top;">CVSS 3.1: 5.3</td>
			<td style="vertical-align: top;"><a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N">AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N</a></td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">CVSS 4.0: 6.0</td>
			<td style="vertical-align: top;"><a href="https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N">AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</a></td>
			<td style="vertical-align: top;">No</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series</link>    
  <pubDate>
    Sat, 21 Sep 2024 13:30:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[OnCell 3120-LTE-1 Series Multiple Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>OnCell 3120-LTE-1 Series firmware version 2.3 and prior are affected by multiple vulnerabilities in the old version of jQuery. These vulnerabilities could put your security at risk in many ways, such as Cross-site Scripting (XSS) attacks and prototype pollution.</p>

<p><br />
The identified vulnerability types and potential impacts are listed&nbsp;below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<div>Improper Neutralization of Input During Web Page Generation (&#39;Cross-site Scripting&#39;) (CWE-79)</div>

			<div>&nbsp;</div>

			<div>CVE-2020-7656, CVE-2020-11022, CVE-2020-11023 (jQuery)</div>
			</td>
			<td>An attacker located remotely can insert HTML or JavaScript into the system via a web interface.</td>
		</tr>
		<tr>
			<td>2</td>
			<td>
			<div>Improperly Controlled Modification of Object Prototype Attributes (&#39;Prototype Pollution&#39;) (CWE-1321)</div>

			<div>&nbsp;</div>

			<div>CVE-2019-11358 (jQuery)</div>
			</td>
			<td>An attacker can inject attributes that are used in other components.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>CVSS</div>
			</th>
			<th scope="col">
			<div>v3.1 Vector</div>
			</th>
			<th scope="col">
			<p>Unauthenticated Remote Exploit</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2019-11358</td>
			<td>
			<p>6.1</p>
			</td>
			<td>
			<p>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</p>
			</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2020-7656</td>
			<td>6.1</td>
			<td>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2020-11022</td>
			<td>6.1</td>
			<td>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2020-11023</td>
			<td>6.1</td>
			<td>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-244707-oncell-3120-lte-1-series-multiple-jquery-vulnerabilities</link>    
  <pubDate>
    Wed, 04 Sep 2024 18:17:21 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Multiple Moxa Product Series Affected by CVE-2024-6387]]></title>
  <description>
    <![CDATA[<p>Multiple Moxa products are affected by the CVE-2024-6387 OpenSSH vulnerability. CVE-2024-6387 is a remote unauthenticated code execution vulnerability in OpenSSH, specifically related to a race condition in the OpenSSH server (sshd). The issue arises when a client fails to authenticate within the LoginGraceTime period (default is 120 seconds, or 600 seconds in older OpenSSH versions). In this case, the sshd&rsquo;s SIGALRM signal handler is invoked asynchronously. However, this signal handler calls several functions that are unsafe to use in asynchronous signal contexts, such as syslog().</p>

<p><br />
The identified vulnerability types and potential impacts are listed&nbsp;below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>Signal Handler Race Condition (CWE-364) &nbsp;</p>

			<p>CVE-2024-6387</p>
			</td>
			<td>This vulnerability allows attackers to execute arbitrary code with root privileges on vulnerable systems without authentication.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>CVSS</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<p>Unauthenticated Remote Exploit</p>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2024-6387</td>
			<td>
			<p>8.8</p>
			</td>
			<td>
			<p>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</p>
			</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-246387-multiple-moxa-product-series-affected-by-cve-2024-6387</link>    
  <pubDate>
    Fri, 02 Aug 2024 14:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDS-510A Series SSH Cryptographic Algorithm Security Enhancement]]></title>
  <description>
    <![CDATA[<p>The EDS-510A Series has enhanced its SSH cryptographic algorithms, including cryptographic key and cipher suites.&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-245831-eds-510a-series-ssh-cryptographic-algorithm-security-enhancement</link>    
  <pubDate>
    Tue, 30 Jul 2024 19:33:29 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Multiple Moxa Product Series Affected by Linux Kernel Memory Double Free Vulnerability]]></title>
  <description>
    <![CDATA[<p>Multiple Moxa product series are affected by the Linux kernel memory double free vulnerability. A use-after-free vulnerability in the Linux kernel&#39;s netfilter: nf_tables component could be exploited to achieve a system crash and local privilege escalation.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>Use After Free (CWE-416)</p>

			<p>CVE-2024-1086</p>
			</td>
			<td>An attacker could exploit the vulnerability to achieve local privilege escalation or cause a system crash</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>CVSS</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<div>Unauthenticated&nbsp;Remote Exploit</div>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2024-1086</td>
			<td>
			<p>7.8</p>
			</td>
			<td><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1" target="_blank">AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</a></td>
			<td>No</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-249807-multiple-moxa-product-series-affected-by-linux-kernel-memory-double-free-vulnerability</link>    
  <pubDate>
    Wed, 10 Jul 2024 22:52:18 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDS-405A/408A Series Multiple Web Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple web server vulnerabilities affect EDS-405A version 3.5&nbsp;and earlier, as well as EDS-408A Series version 3.6&nbsp;and earlier. These vulnerabilities arise from insufficient input validation and improper privilege management. An attacker could exploit these vulnerabilities by sending crafted HTTP input to the web service. Successful exploitation could lead to a denial-of-service attack, remote code execution, and privilege escalation.&nbsp;<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p paraeid="{27f24d58-4ea9-4e2d-b403-ee95e23ca694}{37}" paraid="623129411">Improper Privilege Management (CWE-269)&nbsp;</p>

			<p paraeid="{27f24d58-4ea9-4e2d-b403-ee95e23ca694}{51}" paraid="1847241460">CVE-2015-6464</p>
			</td>
			<td>An attacker could send crafted input to escalate privileges.&nbsp;</td>
		</tr>
		<tr>
			<td>2</td>
			<td>
			<p paraeid="{27f24d58-4ea9-4e2d-b403-ee95e23ca694}{79}" paraid="1279316802">Uncontrolled Resource Exhaustion (CWE-400)&nbsp;</p>

			<p paraeid="{27f24d58-4ea9-4e2d-b403-ee95e23ca694}{87}" paraid="950629408">CVE-2015-6465&nbsp;</p>
			</td>
			<td>The embedded GoAhead web server running on the EDS-405A and EDS-408A is vulnerable to a denial-of-service attack.&nbsp;</td>
		</tr>
		<tr>
			<td>3</td>
			<td>
			<p paraeid="{27f24d58-4ea9-4e2d-b403-ee95e23ca694}{119}" paraid="1764764588">Improper Neutralization of Input During Web Page Generation (&#39;Cross-site Scripting&#39;) (CWE-79)&nbsp;</p>

			<p paraeid="{27f24d58-4ea9-4e2d-b403-ee95e23ca694}{131}" paraid="104785638">CVE-2015-6466&nbsp;</p>
			</td>
			<td>An input field in the administrative web interface lacks input validation, which could be abused to inject JavaScript code.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>CVSS v2.0</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<div>Unauthenticated Remote Exploit</div>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2015-6464&nbsp;</td>
			<td>
			<p>8.2</p>
			</td>
			<td>AV:N/AC:L/Au:S/C:N/I:C/A:C&nbsp;</td>
			<td>No&nbsp;</td>
		</tr>
		<tr>
			<td>CVE-2015-6465</td>
			<td>6.8&nbsp;</td>
			<td>AV:N/AC:L/Au:S/C:N/I:N/A:C&nbsp;</td>
			<td>No&nbsp;</td>
		</tr>
		<tr>
			<td>CVE-2015-6466</td>
			<td>4.3&nbsp;</td>
			<td>AV:N/AC:M/Au:N/C:N/I:P/A:N&nbsp;</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-154603-eds-405a-408a-series-multiple-web-vulnerabilities</link>    
  <pubDate>
    Thu, 27 Jun 2024 10:07:37 GMT
  </pubDate>
</item><item>
  <title><![CDATA[AWK-3131A Series Industrial AP/Bridge/Client Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s AWK-3131A industrial AP/Bridge/Client Series. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Improper Access Control (CWE-284)<br />
			CVE-2019-5136 / TALOS-2019-0925</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Improper system access as a higher privilege user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Use of Hard-coded Cryptographic Key (CWE-321)<br />
			CVE-2019-5137 / TALOS-2019-0926</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Exploitable Hard-coded Cryptographic Key allows for the decryption of captured traffic.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Improper Neutralization of Special Elements used in an OS Command (CWE-78)<br />
			CVE-2019-5138 / TALOS-2019-0927</td>
			<td style="vertical-align: top;">Remote Command Injection to gain control over a device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Use of Hard-coded Credentials (CWE-798)<br />
			CVE-2019-5139 / TALOS-2019-0928</td>
			<td style="vertical-align: top;">Exploitable hard-coded credentials.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">Improper Neutralization of Special Elements used in an OS Command (CWE-78)<br />
			CVE-2019-5140 / TALOS-2019-0929</td>
			<td style="vertical-align: top;">Remote Command Injection to gain control over a device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top;">Improper Neutralization of Special Elements used in an OS Command (CWE-78)<br />
			CVE-2019-5141 / TALOS-2019-0930</td>
			<td style="vertical-align: top;">Remote Command Injection to gain control over a device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top;">Improper Neutralization of Special Elements used in an OS Command (CWE-78)<br />
			CVE-2019-5142 / TALOS-2019-0931</td>
			<td style="vertical-align: top;">Remote Command Injection to gain control over a device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">8</td>
			<td style="vertical-align: top;">Buffer Copy without Checking Size of Input (CWE-120)<br />
			CVE-2019-5143 / TALOS-2019-0932</td>
			<td style="vertical-align: top;">This vulnerability may cause remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">9</td>
			<td style="vertical-align: top;">Out-of-bounds Read (CWE-125)<br />
			CVE-2019-5148 / TALOS-2019-0938</td>
			<td style="vertical-align: top;">An attacker can send a crafted packet and cause denial-of-service of the device.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">10</td>
			<td style="vertical-align: top;">Stack-based Buffer Overflow (CWE-121)<br />
			CVE-2019-5153 / TALOS-2019-0944</td>
			<td style="vertical-align: top;">This vulnerability may cause remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">11</td>
			<td style="vertical-align: top;">Improper Access Control (CWE-284)<br />
			CVE-2019-5162 / TALOS-2019-0955</td>
			<td style="vertical-align: top;">Improper remote shell access to the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">12</td>
			<td style="vertical-align: top;">Authentication Bypass Using an Alternate Path or Channel (CWE-288)<br />
			CVE-2019-5165 / TALOS-2019-0960</td>
			<td style="vertical-align: top;">An exploitable authentication bypass vulnerability. Attacker can trigger authentication bypass on specially configured device.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/awk-3131a-series-industrial-ap-bridge-client-vulnerabilities</link>    
  <pubDate>
    Tue, 25 Jun 2024 16:09:59 GMT
  </pubDate>
</item><item>
  <title><![CDATA[OnCell G3470A-LTE Series Multiple Web Application Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple web server vulnerabilities have been found in the OnCell G3470A-LTE Series version 1.7.7 and prior. These vulnerabilities stem from insufficient input validation and trust in the format string from an external source. An attacker could exploit these vulnerabilities by sending crafted input to the web service. Successful exploitation of these vulnerabilities could lead to a denial-of-service attack, remote code execution, and information disclosure.&nbsp;<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p paraeid="{d419b459-5e4d-4468-b339-125ddaec09aa}{217}" paraid="623129411">Improper neutralization of special elements used in a command (CWE-77)&nbsp;</p>

			<p paraeid="{d419b459-5e4d-4468-b339-125ddaec09aa}{239}" paraid="1847241460">CVE-2024-4638&nbsp;</p>
			</td>
			<td>An attacker can execute unauthorized commands.&nbsp;</td>
		</tr>
		<tr>
			<td>2</td>
			<td>
			<p paraeid="{1c0af84b-d557-4ff1-9450-2ea6c8764d20}{20}" paraid="427118980">Improper neutralization of special elements used in a command (CWE-77)&nbsp;</p>

			<p paraeid="{1c0af84b-d557-4ff1-9450-2ea6c8764d20}{44}" paraid="950629408">CVE-2024-4639&nbsp;</p>
			</td>
			<td>Malicious users can execute unauthorized commands.&nbsp;</td>
		</tr>
		<tr>
			<td>3</td>
			<td>
			<p paraeid="{1c0af84b-d557-4ff1-9450-2ea6c8764d20}{80}" paraid="202632789">Buffercopy without checking size of input (Classic Buffer Overflow)(CWE-120)&nbsp;</p>

			<p paraeid="{1c0af84b-d557-4ff1-9450-2ea6c8764d20}{110}" paraid="104785638">CVE-2024-4640&nbsp;</p>
			</td>
			<td>An attacker can write past the boundaries of allocated buffer regions in the memory, causing a program crash.&nbsp;</td>
		</tr>
		<tr>
			<td>4</td>
			<td>
			<p paraeid="{1c0af84b-d557-4ff1-9450-2ea6c8764d20}{148}" paraid="1773300606">Use of externally-controlled format string (CWE-134)&nbsp;</p>

			<p paraeid="{1c0af84b-d557-4ff1-9450-2ea6c8764d20}{164}" paraid="131024396">CVE-2024-4641&nbsp;</p>
			</td>
			<td>An attacker could change an externally controlled format string to cause a memory leak and denial-of-service attack.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>CVSS</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<div>Remote Exploit without Auth?</div>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2024-4638</td>
			<td>
			<p>7.1</p>
			</td>
			<td><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N</a></td>
			<td>No</td>
		</tr>
		<tr>
			<td>CVE-2024-4639</td>
			<td>7.1</td>
			<td><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N</a></td>
			<td>No</td>
		</tr>
		<tr>
			<td>CVE-2024-4640</td>
			<td>7.1</td>
			<td><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</a></td>
			<td>No</td>
		</tr>
		<tr>
			<td>CVE-2024-4641</td>
			<td>6.3</td>
			<td><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</a></td>
			<td>No</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-242550-oncell-g3470a-lte-series-multiple-web-application-vulnerabilities</link>    
  <pubDate>
    Fri, 21 Jun 2024 16:49:05 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Multiple UC Series IPC SSH Vulnerability]]></title>
  <description>
    <![CDATA[<p>Multiple UC series IPC are affected by CVE-2023-48795. These vulnerabilities are caused by insufficient integrity checks of packets during a handshake. An attacker in a network position between the client and server could omit some negotiation message, forcing to downgrade or disable some security features without detection. This vulnerability may lead to bypass authentication.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>Improper Validation of Integrity Check Value (CWE-354)</p>

			<p>CVE-2023-48795</p>
			</td>
			<td>An attacker may bypass the authentication mechanism.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>CVSS</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<div>Remote Exploit without Auth?</div>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2023-48795</td>
			<td>
			<p>5.9</p>
			</td>
			<td><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N&amp;version=3.1" target="_blank">AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</a></td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-247816-multiple-uc-series-ipc-ssh-vulnerability</link>    
  <pubDate>
    Thu, 20 Jun 2024 18:51:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[SDS-3008 Series Multiple Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>SDS-3008 Series firmware version v2.2 and prior are affected by multiple vulnerabilities in the old version of jQuery. These vulnerabilities could put your security at risk in many ways, such as Cross-site Scripting (XSS) attacks and prototype pollution.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<div>Improper Neutralization of Input During Web Page Generation (&#39;Cross-site Scripting&#39;) (CWE-79)</div>

			<div>&nbsp;</div>

			<div paraeid="{d083f90c-3b39-43b8-9f71-84812278c1c7}{212}" paraid="135287612">CVE-2015-9251, CVE-2020-11022, CVE-2020-11023 (jQuery)</div>
			</td>
			<td>An attacker can remotely insert HTML or JavaScript into the system via a web interface, causing text/javascript to be executed.</td>
		</tr>
		<tr>
			<td>2</td>
			<td>
			<div>Improperly Controlled Modification of Object Prototype Attributes (&#39;Prototype Pollution&#39;) (CWE-1321)</div>

			<div>&nbsp;</div>

			<div>CVE-2019-11358 (jQuery)</div>
			</td>
			<td>An attacker can inject attributes that are used in other components to execute cross-site scripting (XSS) attacks.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>CVSS</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<div><b>Unauthenticated Remote Exploit</b></div>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2015-9251</td>
			<td>
			<p>6.1</p>
			</td>
			<td>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2019-11358</td>
			<td>6.1</td>
			<td>AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2020-11022</td>
			<td>6.9</td>
			<td>AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2020-11023</td>
			<td>6.9</td>
			<td>AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-248126-sds-3008-series-multiple-vulnerabilities</link>    
  <pubDate>
    Wed, 19 Jun 2024 20:54:59 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort 5100A Series Store XSS Vulnerability]]></title>
  <description>
    <![CDATA[<p>The NPort 5100A Series firmware version v1.6 and prior versions are affected by web server vulnerability. The&nbsp;vulnerability&nbsp;is&nbsp;caused by not correctly neutralizing user-controllable input before placing it in output. Malicious users may use the vulnerability to get sensitive information and escalate privileges.&nbsp;<br />
<br />
The identified vulnerability type&nbsp;and potential impact&nbsp;are shown below:</p>

<table>
	<thead>
		<tr>
			<th>Item</th>
			<th>Vulnerability Type</th>
			<th>Impact</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>1</td>
			<td>
			<p>Improper Neutralization of Input During Web Page Generation (&#39;Cross-site Scripting&#39;)</p>

			<p>(CWE-79)</p>
			</td>
			<td>An attacker can use this vulnerability to get sensitive information and escalate privileges.</td>
		</tr>
	</tbody>
</table>

<p><strong>Vulnerability Scoring Detail</strong></p>

<table>
	<thead>
		<tr>
			<th scope="col">
			<div>ID</div>
			</th>
			<th scope="col">
			<div>CVSS</div>
			</th>
			<th scope="col">
			<div>Vector</div>
			</th>
			<th scope="col">
			<div>Remote Exploit without Auth?</div>
			</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2024-3576</td>
			<td>
			<p>8.3</p>
			</td>
			<td>AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L</td>
			<td>Yes</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-246328-nport-5100a-series-store-xss-vulnerability</link>    
  <pubDate>
    Tue, 07 May 2024 15:13:06 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding XZ Containing Malware/Backdoor (CVE-2024-3094)]]></title>
  <description>
    <![CDATA[<p>Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-243094-moxa’s-response-regarding-xz-containing-malware-backdoor-(cve-2024-3094)</link>    
  <pubDate>
    Tue, 30 Apr 2024 13:35:39 GMT
  </pubDate>
</item><item>
  <title><![CDATA[AIG-301 Series Azure uAMQP Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>The AIG-301 Series prior to version 1.5 is affected by multiple Azure uAMQP vulnerabilities. Successful exploitation of these vulnerabilities could remote code execution.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<div>Double free (CWE-415)</div>

			<div>CVE-2024-27099</div>
			</td>
			<td style="vertical-align: top;">An attacker can process an incorrect `AMQP_VALUE` failed state that may cause a double free problem. This may cause an RCE.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">
			<p>Improper Control of Generation of Code (&#39;Code Injection&#39;) (CWE-97)</p>
			CVE-2024-25110</td>
			<td style="vertical-align: top;">An attacker can trigger a use-after-free issue and may cause a remote code execution.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">
			<p>Improper Control of Generation of Code (&#39;Code Injection&#39;) (CWE-97)</p>
			CVE-2024-21646</td>
			<td style="vertical-align: top;">An attacker may craft binary type data. An integer overflow, or wraparound, or memory safety issue can occur and may cause remote code execution.</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>

<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{144}" paraid="1977427625"><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table aria-rowcount="6" border="1" data-tablelook="1184" data-tablestyle="MsoNormalTable">
	<tbody>
		<tr aria-rowindex="1" role="row">
			<td data-celllook="69905" role="rowheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{150}" paraid="2115405519"><strong>ID&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{157}" paraid="421765879"><strong>CVSS&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{164}" paraid="768705518"><strong>Vector&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{171}" paraid="1547673459"><strong>Severity&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{178}" paraid="1914742023"><strong>Remote Exploit without Auth?</strong>&nbsp;</p>
			</td>
		</tr>
		<tr aria-rowindex="2" role="row">
			<td data-celllook="4369" role="rowheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{186}" paraid="106780347">CVE-2024-27099</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{193}" paraid="1171581880">9.8</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{202}" paraid="342088959">AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{209}" paraid="1445055583">Critical&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{216}" paraid="1772763396">Yes</p>
			</td>
		</tr>
		<tr>
			<td data-celllook="4369" role="rowheader">CVE-2024-25110</td>
			<td data-celllook="4369">9.8</td>
			<td data-celllook="4369">AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</td>
			<td data-celllook="4369">Critical</td>
			<td data-celllook="4369">Yes</td>
		</tr>
		<tr>
			<td data-celllook="4369" role="rowheader">CVE-2024-21646</td>
			<td data-celllook="4369">9.8</td>
			<td data-celllook="4369">AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</td>
			<td data-celllook="4369">Critical</td>
			<td data-celllook="4369">Yes</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-248041-aig-301-series-azure-uamqp-vulnerabilities</link>    
  <pubDate>
    Mon, 22 Apr 2024 18:24:06 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort W2150A/W2250A Series Web Server Stack-based Buffer Overflow Vulnerability]]></title>
  <description>
    <![CDATA[<p>A stack-based buffer overflow in the built-in web server in Moxa NPort W2150A/W2250A Series firmware version 2.3 and prior allows a remote attacker to exploit the vulnerability by sending crafted payload to the web service. Successful exploitation of the vulnerability could result in denial of service.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<p>Stack-based Buffer Overflow (CWE-121)</p>

			<p paraeid="{d083f90c-3b39-43b8-9f71-84812278c1c7}{212}" paraid="135287612">CVE-2024-1220</p>
			</td>
			<td style="vertical-align: top;">An attacker can cause a Denial-of-service (DoS) attack</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>

<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{144}" paraid="1977427625"><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table aria-rowcount="6" border="1" data-tablelook="1184" data-tablestyle="MsoNormalTable">
	<tbody>
		<tr aria-rowindex="1" role="row">
			<td data-celllook="69905" role="rowheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{150}" paraid="2115405519"><strong>ID&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{157}" paraid="421765879"><strong>CVSS&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{164}" paraid="768705518"><strong>Vector&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{171}" paraid="1547673459"><strong>Severity&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{178}" paraid="1914742023"><strong>Remote Exploit without Auth?</strong>&nbsp;</p>
			</td>
		</tr>
		<tr aria-rowindex="2" role="row">
			<td data-celllook="4369" role="rowheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{186}" paraid="106780347">CVE-2024-1220</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{193}" paraid="1171581880">8.2</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{202}" paraid="342088959">AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{209}" paraid="1445055583">High&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{216}" paraid="1772763396">Yes</p>
			</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-238975-nport-w2150a-w2250a-series-web-server-stack-based-buffer-overflow-vulnerability</link>    
  <pubDate>
    Thu, 07 Mar 2024 10:29:21 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDS-4000/G4000 Series IP Forwarding Vulnerability]]></title>
  <description>
    <![CDATA[<p>The EDS-4000/G4000 Series prior to version 3.2 includes IP forwarding capabilities that users cannot deactivate. An attacker may be able to send requests to the product and have it forwarded to the target.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<p paraeid="{d083f90c-3b39-43b8-9f71-84812278c1c7}{206}" paraid="73189850">Unintended Proxy or Intermediary (&#39;Confused Deputy&#39;) (CWE-441)</p>

			<p paraeid="{d083f90c-3b39-43b8-9f71-84812278c1c7}{212}" paraid="135287612">CVE-2024-0387</p>
			</td>
			<td style="vertical-align: top;">An attacker can bypass access controls or hide the source of malicious requests.</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>

<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{144}" paraid="1977427625"><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table aria-rowcount="6" border="1" data-tablelook="1184" data-tablestyle="MsoNormalTable">
	<tbody>
		<tr aria-rowindex="1" role="row">
			<td data-celllook="69905" role="rowheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{150}" paraid="2115405519"><strong>ID&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{157}" paraid="421765879"><strong>CVSS&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{164}" paraid="768705518"><strong>Vector&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{171}" paraid="1547673459"><strong>Severity&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{178}" paraid="1914742023"><strong>Remote Exploit without Auth?</strong>&nbsp;</p>
			</td>
		</tr>
		<tr aria-rowindex="2" role="row">
			<td data-celllook="4369" role="rowheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{186}" paraid="106780347">CVE-2024-0387</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{193}" paraid="1171581880">6.5&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{202}" paraid="342088959">AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{209}" paraid="1445055583">Medium&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{216}" paraid="1772763396">No</p>
			</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-237129-eds-4000-g4000-series-ip-forwarding-vulnerability</link>    
  <pubDate>
    Mon, 26 Feb 2024 21:00:23 GMT
  </pubDate>
</item><item>
  <title><![CDATA[PT-G503 Series Multiple Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>PT-G503 Series firmware version v5.2 and prior are affected by multiple vulnerabilities in the old version of jQuery, weak cipher suites, and unsecure web cookies. Using the older jQuery version and weak cipher suites and not setting session cookie attributes properly caused these vulnerabilities. These vulnerabilities could put your security at risk in many ways, such as Cross-site Scripting (XSS) attacks, prototype pollution, data leaks, unauthorized access to user sessions, etc.&nbsp;</p>

<p><br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<div paraeid="{04aa7d9f-4b37-49f8-b098-a275d897739c}{103}" paraid="623129411">
			<div paraeid="{301f0e04-1a03-4498-b1fc-8a8f84cfa53c}{191}" paraid="1599680942">Improper Neutralization of Input During Web Page Generation (&#39;Cross-site Scripting&#39;) (CWE-79)&nbsp;</div>

			<div paraeid="{301f0e04-1a03-4498-b1fc-8a8f84cfa53c}{203}" paraid="1827622035">CVE-2015-9251, CVE-2020-11022, CVE-2020-11023 (jQuery)&nbsp;</div>
			</div>
			</td>
			<td style="vertical-align: top;">An attacker located remotely can insert HTML or JavaScript into the system via a web interface.&nbsp;</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">
			<div paraeid="{301f0e04-1a03-4498-b1fc-8a8f84cfa53c}{229}" paraid="1732742279">Improperly Controlled Modification of Object Prototype Attributes (&#39;Prototype Pollution&#39;) (CWE-1321)&nbsp;</div>

			<div paraeid="{301f0e04-1a03-4498-b1fc-8a8f84cfa53c}{241}" paraid="1173967737">CVE-2019-11358 (jQuery)&nbsp;</div>
			</td>
			<td style="vertical-align: top;">An attacker can inject attributes that are used in other components.&nbsp;</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">
			<div paraeid="{0a329090-1aab-4b30-a843-73f42d1c28c9}{12}" paraid="1749752444">Inadequate Encryption Strength (CWE-326)&nbsp;</div>

			<div paraeid="{0a329090-1aab-4b30-a843-73f42d1c28c9}{22}" paraid="1024474465">CVE-2005-4900 (cipher)&nbsp;</div>
			</td>
			<td style="vertical-align: top;">An attacker may be able to decrypt the data using spoofing attacks.&nbsp;</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">
			<div paraeid="{0a329090-1aab-4b30-a843-73f42d1c28c9}{48}" paraid="676561236">Sensitive Cookie Without &#39;HttpOnly&#39; Flag (CWE-1004)&nbsp;</div>

			<div paraeid="{0a329090-1aab-4b30-a843-73f42d1c28c9}{64}" paraid="1728671318">CVE-2023-4217 (Cookie)&nbsp;</div>
			</td>
			<td style="vertical-align: top;">This vulnerability could cause security risks and allow unauthorized access to user session data.&nbsp;</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">
			<div paraeid="{0a329090-1aab-4b30-a843-73f42d1c28c9}{88}" paraid="586007660">Sensitive Cookie in HTTPS Session Without &#39;Secure&#39; Attribute (CWE-614)&nbsp;</div>

			<div paraeid="{0a329090-1aab-4b30-a843-73f42d1c28c9}{98}" paraid="1474805587">CVE-2023-5035 (Cookie)&nbsp;</div>
			</td>
			<td style="vertical-align: top;">This vulnerability could cause the cookie to be transmitted in plaintext over an HTTP session.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>

<p><b>Vulnerability Scoring Details</b></p>

<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">ID</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">CVSS V3.1</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">VECTOR</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">REMOTE EXPLOIT WITHOUT AUTH?</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">CVE-2005-4900&nbsp;</td>
			<td style="vertical-align: top;">5.9&nbsp;</td>
			<td style="vertical-align: top;">AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&nbsp;</td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2015-9251&nbsp;</td>
			<td style="vertical-align: top;">6.1&nbsp;</td>
			<td style="vertical-align: top;">AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&nbsp;</td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2019-11358&nbsp;</td>
			<td style="vertical-align: top;">6.1&nbsp;</td>
			<td style="vertical-align: top;">AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&nbsp;</td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2020-11022&nbsp;</td>
			<td style="vertical-align: top;">6.9&nbsp;</td>
			<td style="vertical-align: top;">AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N&nbsp;</td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2020-11023&nbsp;</td>
			<td style="vertical-align: top;">6.9&nbsp;</td>
			<td style="vertical-align: top;">AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N&nbsp;</td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-4217&nbsp;</td>
			<td style="vertical-align: top;">3.1&nbsp;</td>
			<td style="vertical-align: top;">AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N&nbsp;</td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-5035&nbsp;</td>
			<td style="vertical-align: top;">3.1&nbsp;</td>
			<td style="vertical-align: top;">AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N&nbsp;</td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230203-pt-g503-series-multiple-vulnerabilities</link>    
  <pubDate>
    Fri, 05 Jan 2024 00:24:49 GMT
  </pubDate>
</item><item>
  <title><![CDATA[OnCell G3150A-LTE Series Multiple Web Application Vulnerabilities and Security Enhancement ]]></title>
  <description>
    <![CDATA[<p>The OnCell G3150A-LTE Series prior to version 1.3 is affected by multiple web application vulnerabilities: CVE-2004-2761, CVE-2013-2566, CVE-2016-2183, CVE-2023-6093, and CVE-2023-6094. These vulnerabilities are caused by applying weak cryptographic algorithms and cipher suites, and incorrectly restricts frame objects. Successful exploitation of these vulnerabilities could lead to unauthorized access and unexpected user interaction with the web application.&nbsp;<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<p paraeid="{d083f90c-3b39-43b8-9f71-84812278c1c7}{206}" paraid="73189850">Cryptographic Issues (CWE-310)&nbsp;</p>

			<p paraeid="{d083f90c-3b39-43b8-9f71-84812278c1c7}{212}" paraid="135287612">CVE-2004-2761&nbsp;</p>
			</td>
			<td style="vertical-align: top;">This vulnerability may make it easier for context-dependent attackers to conduct spoofing attacks.&nbsp;</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">
			<p paraeid="{d083f90c-3b39-43b8-9f71-84812278c1c7}{234}" paraid="117078566">Inadequate Encryption Strength (CWE-326)&nbsp;</p>

			<p paraeid="{d083f90c-3b39-43b8-9f71-84812278c1c7}{246}" paraid="102471204">CVE-2013-2566&nbsp;</p>
			</td>
			<td style="vertical-align: top;">This vulnerability may make it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in numerous sessions that use the same plaintext.&nbsp;</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{19}" paraid="95956179">Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)&nbsp;</p>

			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{25}" paraid="461683322">CVE-2016-2183&nbsp;</p>
			</td>
			<td style="vertical-align: top;">This vulnerability may make it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session.&nbsp;</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{47}" paraid="1695095495">Improper Restriction of Rendered UI Layers or Frames (Clickjacking) (CWE-1021)&nbsp;</p>

			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{63}" paraid="1847241460">CVE-2023-6093&nbsp;</p>
			</td>
			<td style="vertical-align: top;">This vulnerability may lead the attacker to trick the user into interacting with the application.&nbsp;</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{101}" paraid="1719237632">Cleartext Transmission of Sensitive Information (CWE-319)&nbsp;</p>

			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{115}" paraid="1975469">CVE-2023-6094&nbsp;</p>
			</td>
			<td style="vertical-align: top;">This vulnerability may lead the attacker to gain access to user accounts and access sensitive data used by the user accounts.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>

<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{144}" paraid="1977427625"><strong>Vulnerability Scoring Details&nbsp;</strong></p>

<table aria-rowcount="6" border="1" data-tablelook="1184" data-tablestyle="MsoNormalTable">
	<tbody>
		<tr aria-rowindex="1" role="row">
			<td data-celllook="69905" role="rowheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{150}" paraid="2115405519"><strong>ID&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{157}" paraid="421765879"><strong>CVSS&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{164}" paraid="768705518"><strong>Vector&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{171}" paraid="1547673459"><strong>Severity&nbsp;</strong></p>
			</td>
			<td data-celllook="69905" role="columnheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{178}" paraid="1914742023"><strong>Remote Exploit without Auth?</strong>&nbsp;</p>
			</td>
		</tr>
		<tr aria-rowindex="2" role="row">
			<td data-celllook="4369" role="rowheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{186}" paraid="106780347">CVE-2004-2761&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{193}" paraid="1171581880">5.0&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{202}" paraid="342088959">AV:N/AC:L/AU:N/C:N/I:P/A:N&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{209}" paraid="1445055583">Medium&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{216}" paraid="1772763396">Yes&nbsp;</p>
			</td>
		</tr>
		<tr aria-rowindex="3" role="row">
			<td data-celllook="4369" role="rowheader">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{226}" paraid="1533795228">CVE-2013-2566&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{233}" paraid="1406460937">5.9&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{242}" paraid="691866235">AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{4b6116f6-0db9-4b1b-9dbc-0c4527ef5039}{249}" paraid="633858311">Medium&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{1}" paraid="21195505">Yes&nbsp;</p>
			</td>
		</tr>
		<tr aria-rowindex="4" role="row">
			<td data-celllook="4369" role="rowheader">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{11}" paraid="1331605980">CVE-2016-2183&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{18}" paraid="2128227199">7.5&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{27}" paraid="314808968">AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{34}" paraid="1963719780">High&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{43}" paraid="1742630880">Yes&nbsp;</p>
			</td>
		</tr>
		<tr aria-rowindex="5" role="row">
			<td data-celllook="4369" role="rowheader">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{53}" paraid="381391653">CVE-2023-6093&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{62}" paraid="1176811638">5.3&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{73}" paraid="266777708">AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{100}" paraid="1937282999">Medium&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{107}" paraid="793266481">Yes&nbsp;</p>
			</td>
		</tr>
		<tr aria-rowindex="6" role="row">
			<td data-celllook="4369" role="rowheader">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{117}" paraid="512568101">CVE-2023-6094&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{126}" paraid="683473854">5.3&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{133}" paraid="1964138129">AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{149}" paraid="1556277726">Medium&nbsp;</p>
			</td>
			<td data-celllook="4369">
			<p paraeid="{da591c47-8e31-452f-ae46-1ea5767aa828}{156}" paraid="1016257015">Yes&nbsp;</p>
			</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/oncell-g3150a-lte-series-multiple-web-application-vulnerabilities-and-security-enhancement</link>    
  <pubDate>
    Fri, 29 Dec 2023 23:50:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[ioLogik E1200 Series Web Server Vulnerability]]></title>
  <description>
    <![CDATA[<p>The ioLogik E1200 Series prior to version 3.3 is affected by web application vulnerabilities.</p>

<p><strong>CVE-2023-5961</strong></p>

<p>A vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. An attacker can exploit this vulnerability to trick a client into making an unintentional request to the web server, which will be treated as an authentic request.</p>

<p><strong>CVE-2023-5962</strong></p>

<p>A vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data.</p>

<p>&nbsp;</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<div>Cross-Site Request Forgery (CSRF) (CWE-352)</div>

			<div>CVE-2023-5961</div>
			</td>
			<td style="vertical-align: top;">This vulnerability may lead an attacker to perform operations on behalf of the victimized user.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">
			<div>Use of a Broken or Risky Cryptographic Algorithm (CWE-327)</div>

			<div>CVE-2023-5962</div>
			</td>
			<td style="vertical-align: top;">This vulnerability may lead an attacker to get unexpected authorization.</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>

<p><b>Vulnerability Scoring Details</b></p>

<table>
	<thead>
		<tr>
			<th>ID</th>
			<th>CVSS V3.1</th>
			<th>VECTOR</th>
			<th>REMOTE EXPLOIT WITHOUT AUTH?</th>
		</tr>
	</thead>
	<tbody>
		<tr>
			<td>CVE-2023-5961</td>
			<td>8.8</td>
			<td>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&nbsp;</td>
			<td>Yes</td>
		</tr>
		<tr>
			<td>CVE-2023-5962</td>
			<td>6.5</td>
			<td>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</td>
			<td>No</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-235250-iologik-e1200-series-web-server-vulnerability</link>    
  <pubDate>
    Sat, 23 Dec 2023 16:50:23 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort 6000 Series Incorrect Implementation of Authentication Algorithm Vulnerability ]]></title>
  <description>
    <![CDATA[<p paraeid="{9f5c2b13-202b-4d0f-9dcb-4375605acf13}{41}" paraid="2049834681">A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable.&nbsp;This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service.&nbsp;</p>

<p><br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<div paraeid="{9f5c2b13-202b-4d0f-9dcb-4375605acf13}{114}" paraid="1010157904">Incorrect Implementation of Authentication Algorithm (CWE-303)&nbsp;</div>

			<div paraeid="{9f5c2b13-202b-4d0f-9dcb-4375605acf13}{122}" paraid="2135515808">Storing Passwords in a Recoverable Format (CWE-257)&nbsp;</div>

			<div paraeid="{9f5c2b13-202b-4d0f-9dcb-4375605acf13}{130}" paraid="623129411">Use of a Broken or Risky Cryptographic Algorithm (CWE-327)&nbsp;</div>

			<div paraeid="{9f5c2b13-202b-4d0f-9dcb-4375605acf13}{138}" paraid="1739987332">&nbsp;</div>

			<div paraeid="{9f5c2b13-202b-4d0f-9dcb-4375605acf13}{142}" paraid="1847241460">CVE-2023-5627&nbsp;</div>

			<div>&nbsp;</div>
			</td>
			<td style="vertical-align: top;">An attacker can get privileged access to the web service.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>

<p><b>Vulnerability Scoring Details</b></p>

<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">ID</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">CVSS V3.1</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">VECTOR</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">REMOTE EXPLOIT WITHOUT AUTH?</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">CVE-2023-5627</td>
			<td style="vertical-align: top;">7.5&nbsp;</td>
			<td style="vertical-align: top;">AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&nbsp;</td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-232905-nport-6000-series-incorrect-implementation-of-authentication-algorithm-vulnerability</link>    
  <pubDate>
    Wed, 01 Nov 2023 22:44:38 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-810/G902/G903 Series Web Server Buffer Overflow Vulnerability]]></title>
  <description>
    <![CDATA[<p>A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them&nbsp; vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot.&nbsp;</p>

<p><br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<div paraeid="{04aa7d9f-4b37-49f8-b098-a275d897739c}{103}" paraid="623129411">Buffer Copy Without Checking Size of Input (CWE-120)&nbsp;</div>

			<div paraeid="{04aa7d9f-4b37-49f8-b098-a275d897739c}{123}" paraid="1847241460">CVE-2023-4452&nbsp;</div>
			</td>
			<td style="vertical-align: top;">An attacker can trigger the device reboot.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>

<p><b>Vulnerability Scoring Details</b></p>

<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">ID</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">CVSS V3.1</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">VECTOR</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">REMOTE EXPLOIT WITHOUT AUTH?</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">CVE-2023-4452</td>
			<td style="vertical-align: top;">6.5</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</a>&nbsp;</td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-234880-edr-810-g902-g903-series-web-server-buffer-overflow-vulnerability</link>    
  <pubDate>
    Wed, 01 Nov 2023 21:20:22 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort 5000 Series Firmware Improper Validation of Integrity Check Vulnerability]]></title>
  <description>
    <![CDATA[<p>All firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices.&nbsp;<br />
&nbsp;</p>

<p>The identified vulnerability type and potential impact are shown below:&nbsp;</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<div paraeid="{9b1ca5b4-cb3f-4c9b-bae8-45fd5f4415a3}{125}" paraid="676561236">Improper Validation of Integrity Check Value (CWE-354)&nbsp;</div>

			<div paraeid="{9b1ca5b4-cb3f-4c9b-bae8-45fd5f4415a3}{139}" paraid="1728671318">CVE-2023-4929&nbsp;</div>
			</td>
			<td style="vertical-align: top;">
			<div>This vulnerability could allow an unauthorized attacker to gain control of a device.&nbsp;</div>
			</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>
</div>

<p><strong>Vulnerability Scoring Details</strong></p>

<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">ID</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">CVSS V3.1</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">VECTOR</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">REMOTE EXPLOIT WITHOUT AUTH?</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">CVE-2023-4929</td>
			<td style="vertical-align: top;">6.5</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H</a></td>
			<td style="vertical-align: top;">No</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability</link>    
  <pubDate>
    Fri, 20 Oct 2023 22:02:27 GMT
  </pubDate>
</item><item>
  <title><![CDATA[TN-5900 and TN-4900 Series Web Server Multiple Vulnerabilities ]]></title>
  <description>
    <![CDATA[<p>TN-5900 Series prior to version 3.3 and the TN-4900 Series prior to version 1.2.4 are affected by multiple web server vulnerabilities. Insufficient input validation causes these vulnerabilities. An attacker could exploit the vulnerabilities by sending crafted input to the web service. If exploited successfully, these vulnerabilities could lead to Denial-of-Service, remote code execution, and privilege escalation.&nbsp;</p>

<p>The identified vulnerability types and potential impacts are shown below:&nbsp;</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<p paraeid="{5ad00c6a-382f-4589-87fc-113374df0df4}{129}" paraid="623129411">Improper Authentication (CWE-287)&nbsp;</p>

			<p paraeid="{5ad00c6a-382f-4589-87fc-113374df0df4}{135}" paraid="1847241460">CVE-2023-33237&nbsp;</p>
			</td>
			<td style="vertical-align: top;">An attacker can use brute force to break the authentication parameters.&nbsp;</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">
			<p paraeid="{5ad00c6a-382f-4589-87fc-113374df0df4}{157}" paraid="1279316802">Improper Neutralization of Special Elements used in a Command (&#39;Command Injection&#39;) (CWE-77)&nbsp;</p>

			<p paraeid="{5ad00c6a-382f-4589-87fc-113374df0df4}{163}" paraid="950629408">CVE-2023-33238, CVE-2023-33239, CVE-2023-34213, CVE-2023-34214, CVE-2023-34215&nbsp;</p>
			</td>
			<td style="vertical-align: top;">An attacker located remotely can execute arbitrary commands on the device via a web interface.&nbsp;</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">
			<p paraeid="{5ad00c6a-382f-4589-87fc-113374df0df4}{185}" paraid="202632789">Improper Limitation of a Pathname to a Restricted Directory (&#39;Path Traversal&#39;) (CWE-22)&nbsp;</p>

			<p paraeid="{5ad00c6a-382f-4589-87fc-113374df0df4}{191}" paraid="104785638">CVE-2023-34216, CVE-2023-34217&nbsp;</p>
			</td>
			<td style="vertical-align: top;">An attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.&nbsp;</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>

<p><strong>Vulnerability Scoring Details</strong></p>

<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">ID</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">CVSS v3.1</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vector</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Remote Exploit without Auth?&nbsp;</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">CVE-2023-33237&nbsp;</td>
			<td style="vertical-align: top;">8.8&nbsp;</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</a>&nbsp;</td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-33238&nbsp;</td>
			<td style="vertical-align: top;">7.2&nbsp;</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</a>&nbsp;</td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-33239&nbsp;</td>
			<td style="vertical-align: top;">8.8&nbsp;</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</a>&nbsp;</td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-34213&nbsp;</td>
			<td style="vertical-align: top;">8.8&nbsp;</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</a>&nbsp;</td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-34214&nbsp;</td>
			<td style="vertical-align: top;">7.2&nbsp;</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</a>&nbsp;</td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-34215&nbsp;</td>
			<td style="vertical-align: top;">7.2&nbsp;</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</a>&nbsp;</td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-34216&nbsp;</td>
			<td style="vertical-align: top;">8.1&nbsp;</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</a>&nbsp;</td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-34217&nbsp;</td>
			<td style="vertical-align: top;">8.1&nbsp;</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H&amp;version=3.1" rel="noreferrer noopener" target="_blank">AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</a>&nbsp;</td>
			<td style="vertical-align: top;">No</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities</link>    
  <pubDate>
    Fri, 20 Oct 2023 14:18:59 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort 5600 Series Cryptographic Algorithm Security Enhancements]]></title>
  <description>
    <![CDATA[<p>NPort 5600 Series has enhanced its cryptographic algorithms, including cryptographic key and cipher suites.</p>

<p><strong>Security Enhancements</strong></p>

<ol>
	<li><strong>Cryptographic Key</strong><br />
	Increases the RSA key length from 1024 to 2048.</li>
	<li><strong>Static Key Ciphers</strong><br />
	Removes medium strength cipher suites TLS_RSA_WITH_AES_128_CBC_SHA and TLS_RSA_WITH_AES_128_GCM_SHA256.</li>
	<li><strong>Strong Cipher Algorithms</strong><br />
	Uses strong cipher suites ECDHE-RSA-AES128-SHA256 and ECDHE-RSA-AES128-GCM-SHA256.</li>
</ol>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-221202-nport-5600-series-cryptographic-algorithm-security-enhancements</link>    
  <pubDate>
    Mon, 04 Sep 2023 18:04:37 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MXsecurity Series Multiple Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>These vulnerabilities are caused by the improper design or implementation of authentication mechanisms and input validation. Exploiting these vulnerabilities could enable an attacker to bypass authentication, which could lead to the unauthorized disclosure or tampering of authenticated information, unauthorized access to sensitive data, and remote access without proper authorization.</p>

<p><br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<div>Small Space of Random Values (CWE-334)</div>

			<div>CVE-2023-39979</div>
			</td>
			<td style="vertical-align: top;">An attacker can bypass authentication to gain unauthorized access.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">
			<div>Improper Neutralization of Special Elements used in an SQL Command (&#39;SQL Injection&#39;) (CWE-89)</div>

			<div>CVE-2023-39980</div>
			</td>
			<td style="vertical-align: top;">An attacker can change the SQL command to gain unauthorized access to disclose information.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">
			<div>Improper Authentication (CWE-287)</div>

			<div>CVE-2023-39981</div>
			</td>
			<td style="vertical-align: top;">An attacker can gain unauthorized access to disclose device information.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">
			<div>Use of Hard-coded Credentials (CWE-798)</div>

			<div>CVE-2023-39982</div>
			</td>
			<td style="vertical-align: top;">An attacker can facilitate man-in-the-middle attacks and enable the decryption of SSH traffic.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">
			<div>Improperly Controlled Modification of Dynamically-Determined Object Attributes (CWE-915)</div>
			CVE-2023-39983</td>
			<td style="vertical-align: top;">An attacker can register/add a device via the nsm-web application.</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>

<p><b>Vulnerability Scoring Details</b></p>

<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">ID</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">CVSS V3.1</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">VECTOR</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">REMOTE EXPLOIT WITHOUT AUTH?</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">CVE-2023-39979</td>
			<td style="vertical-align: top;">9.8</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1" title="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1">AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</a></td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-39980</td>
			<td style="vertical-align: top;">7.1</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N&amp;version=3.1" target="_blank">AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N</a></td>
			<td style="vertical-align: top;">No</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-39981</td>
			<td style="vertical-align: top;">7.5</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&amp;version=3.1" title="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&amp;version=3.1">AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</a></td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-39982</td>
			<td style="vertical-align: top;">7.5</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&amp;version=3.1" title="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&amp;version=3.1">AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</a></td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">CVE-2023-39983</td>
			<td style="vertical-align: top;">5.3</td>
			<td style="vertical-align: top;"><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&amp;version=3.1" title="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&amp;version=3.1">AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</a></td>
			<td style="vertical-align: top;">Yes</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities</link>    
  <pubDate>
    Fri, 01 Sep 2023 09:49:32 GMT
  </pubDate>
</item><item>
  <title><![CDATA[ioLogik 4000 Series Multiple Web Server Vulnerabilities and Improper Access Control Vulnerability ]]></title>
  <description>
    <![CDATA[<p paraeid="{c1470a99-992a-4cfb-94c9-7bd6517ee83f}{63}" paraid="805042062">ioLogik 4000 Series (ioLogik E4200) firmware v1.6 and prior is affected by multiple web server vulnerabilities and an improper access control vulnerability.&nbsp;&nbsp;</p>

<p paraeid="{c1470a99-992a-4cfb-94c9-7bd6517ee83f}{113}" paraid="1210676295"><strong>Web Server Vulnerabilities&nbsp;</strong></p>

<p paraeid="{c1470a99-992a-4cfb-94c9-7bd6517ee83f}{137}" paraid="1946082979">The web server vulnerabilities arise from improper configuration or implementation of HTTP headers. Attackers could exploit the vulnerabilities to compromise the web service.&nbsp;</p>

<p paraeid="{c1470a99-992a-4cfb-94c9-7bd6517ee83f}{171}" paraid="1765913742"><strong>Improper Access Control Vulnerability&nbsp;</strong></p>

<p paraeid="{c1470a99-992a-4cfb-94c9-7bd6517ee83f}{191}" paraid="1842026557">The improper access control vulnerability results from improper control of an existing unauthorized service. Attackers could exploit the vulnerability by connecting to the unauthorized service. Successful exploitation of the vulnerability could lead to unauthorized access.&nbsp;</p>

<p paraeid="{b4bc2dba-dd8f-4214-9141-182cecd8e3f6}{32}" paraid="2127776384">The identified vulnerability types and potential impacts are shown below:&nbsp;</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<div paraeid="{b4bc2dba-dd8f-4214-9141-182cecd8e3f6}{71}" paraid="623129411">Existing unauthorized service&nbsp;</div>

			<div paraeid="{b4bc2dba-dd8f-4214-9141-182cecd8e3f6}{91}" paraid="15820739">(CWE-284 Improper Access Control）&nbsp;</div>

			<div paraeid="{b4bc2dba-dd8f-4214-9141-182cecd8e3f6}{117}" paraid="1847241460">CVE-2023-4227&nbsp;</div>
			</td>
			<td style="vertical-align: top;">Attackers can gain unauthorized access&nbsp;</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">
			<div paraeid="{b4bc2dba-dd8f-4214-9141-182cecd8e3f6}{157}" paraid="1031118464">Session cookie attributes not set properly&nbsp;</div>

			<div paraeid="{b4bc2dba-dd8f-4214-9141-182cecd8e3f6}{185}" paraid="176481948">(CWE-1004: Sensitive Cookie Without &#39;HttpOnly&#39; Flag）&nbsp;</div>

			<div paraeid="{b4bc2dba-dd8f-4214-9141-182cecd8e3f6}{199}" paraid="950629408">CVE-2023-4228&nbsp;</div>
			</td>
			<td style="vertical-align: top;">Attackers can compromise the web service&nbsp;</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">
			<div paraeid="{b4bc2dba-dd8f-4214-9141-182cecd8e3f6}{243}" paraid="80457712">Session headers not implemented.&nbsp;</div>

			<div paraeid="{d6f7306f-8e7a-4745-a684-731a32aef7cb}{12}" paraid="1473010816">(CWE-1021: Improper Restriction of Rendered UI Layers or Frames）&nbsp;</div>

			<div paraeid="{d6f7306f-8e7a-4745-a684-731a32aef7cb}{22}" paraid="104785638">CVE-2023-4229&nbsp;</div>
			</td>
			<td style="vertical-align: top;">Attackers can compromise the web service&nbsp;</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">
			<div paraeid="{d6f7306f-8e7a-4745-a684-731a32aef7cb}{64}" paraid="2001308102">Server banner information disclosure&nbsp;</div>

			<div paraeid="{d6f7306f-8e7a-4745-a684-731a32aef7cb}{70}" paraid="579422554">(CWE-200: Exposure of Sensitive Information to an Unauthorized Actor）&nbsp;</div>

			<div paraeid="{d6f7306f-8e7a-4745-a684-731a32aef7cb}{80}" paraid="687998784">CVE-2023-4230&nbsp;</div>
			</td>
			<td style="vertical-align: top;">Attackers can compromise the web service&nbsp;</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230310-iologik-4000-series-multiple-web-server-vulnerabilities-and-improper-access-control-vulnerability</link>    
  <pubDate>
    Thu, 24 Aug 2023 09:37:03 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort IAW5000A-I/O Series Hardcoded Credential Vulnerability ]]></title>
  <description>
    <![CDATA[<p paraeid="{aeced16a-4639-47ae-b881-ded9a521f0c2}{122}" paraid="842994526"><strong>CVE-2023-4204&nbsp;</strong></p>

<p paraeid="{aeced16a-4639-47ae-b881-ded9a521f0c2}{122}" paraid="842994526">A vulnerability has been identified in NPort IAW5000A-I/O Series firmware versions prior to v2.2, which poses a potential risk to the security and integrity of the affected device.&nbsp;</p>

<p paraeid="{aeced16a-4639-47ae-b881-ded9a521f0c2}{128}" paraid="1441928006">The identified vulnerability types and potential effects are shown below:&nbsp;</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<div paraeid="{aeced16a-4639-47ae-b881-ded9a521f0c2}{207}" paraid="1799671408">Use of hardcoded credentials&nbsp;</div>

			<div paraeid="{aeced16a-4639-47ae-b881-ded9a521f0c2}{225}" paraid="322258047">(CWE-798)&nbsp;</div>
			</td>
			<td style="vertical-align: top;">
			<div>This vulnerability is attributed to the presence of a hardcoded key, which could potentially facilitate firmware manipulation.&nbsp;</div>
			</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230304-nport-iaw5000a-i-o-series-hardcoded-credential-vulnerability</link>    
  <pubDate>
    Wed, 16 Aug 2023 22:31:38 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Multiple Switch Series Affected by NTP Denial of Service Vulnerability ]]></title>
  <description>
    <![CDATA[<p>The following vulnerability affects some of Moxa&rsquo;s switch series. An attacker may consume the CPU and log excessively.&nbsp;<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<div paraeid="{a20fffad-7f79-4887-8616-0cdf9d51189c}{112}" paraid="1799671408">Uncontrolled Recursion&nbsp;</div>

			<div paraeid="{a20fffad-7f79-4887-8616-0cdf9d51189c}{118}" paraid="322258047">(CWE-674)&nbsp;</div>
			</td>
			<td style="vertical-align: top;">A remote, unauthenticated attacker may be able to cause a denial-of-service condition on a vulnerable NTP server.&nbsp;</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230307-multiple-switch-series-affected-by-ntp-denial-of-service-vulnerability</link>    
  <pubDate>
    Wed, 02 Aug 2023 12:28:02 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort 5110 Series Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple vulnerabilities were discovered in the NPort 5110 Series that allow a remote attacker to conduct a denial-of-service attack or overwrite certain values in the memory to cause information to become unavailable.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<p>Out-of-bounds Write (CWE-787)</p>

			<p>CVE-2022-2044</p>
			</td>
			<td style="vertical-align: top;">Certain values in the memory may not be available.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">
			<p>Out-of-bounds Write (CWE-787)</p>

			<p>CVE-2022-2043</p>
			</td>
			<td style="vertical-align: top;">A vulnerability allows a remote attacker to conduct a denial-of-service attack.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport5110-series-vulnerabilities</link>    
  <pubDate>
    Mon, 31 Jul 2023 15:01:27 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Arm-based Computer Improper Privilege Management Vulnerability]]></title>
  <description>
    <![CDATA[<p>Successful exploitation of the improper privilege management vulnerability could allow a local user with normal privileges to change their settings so they have root privileges on affected devices.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<p>Improper Privilege Management</p>
			(CWE-269)</td>
			<td style="vertical-align: top;">A local user with low privileges can change their settings so they have root privileges.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/arm-based-computer-improper-privilege-management-vulnerability</link>    
  <pubDate>
    Fri, 14 Jul 2023 14:34:07 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the PwnKit Vulnerability]]></title>
  <description>
    <![CDATA[<p paraeid="{aea28cdc-589c-4830-934e-699dd0643159}{44}" paraid="193469759">The Qualys Research Team has discovered a memory corruption vulnerability in polkit&#39;s pkexec, a SUID-root program that is installed by default on every major Linux distribution. This easily exploited vulnerability allows users without the proper access levels to gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration.&nbsp;</p>

<p paraeid="{aea28cdc-589c-4830-934e-699dd0643159}{70}" paraid="1736692851">Moxa has investigated the vulnerability and has determined that it affects some of Moxa&#39;s devices. In response to this, Moxa has developed solutions to address this vulnerability. Please refer to the Affected Products and Solutions section below to learn more.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-pwnkit-vulnerability</link>    
  <pubDate>
    Fri, 14 Jul 2023 13:51:44 GMT
  </pubDate>
</item><item>
  <title><![CDATA[TN-5900 Series User Enumeration Vulnerability]]></title>
  <description>
    <![CDATA[<p>A user enumeration vulnerability exists in the TN-5900 Series. The vulnerability may allow a remote attacker to determine whether a user is valid during password recovery through the web login page and enable a brute force attack with valid users.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">CWE-204: Observable Response Discrepancy</td>
			<td style="vertical-align: top;">
			<p>An attacker located remotely can obtain sensitive information.</p>
			</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230401-tn-5900-series-user-enumeration-vulnerability</link>    
  <pubDate>
    Mon, 03 Jul 2023 14:07:41 GMT
  </pubDate>
</item><item>
  <title><![CDATA[CN2600 Series Multiple Weak Cryptographic Algorithm Vulnerabilities ]]></title>
  <description>
    <![CDATA[<p>The following vulnerability affects the CN2600 Series. An attacker may compromise the connections and leak sensitive information.&nbsp;&nbsp;<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<p>Weak cryptographic algorithm&nbsp;</p>

			<p>(CWE-327: Use of a Broken or Risky Cryptographic Algorithm)&nbsp;</p>
			</td>
			<td style="vertical-align: top;">An attacker may bypass authentication, steal keys, and reduce the integrity capability that provides for remote connections.&nbsp;</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/cn2600-series-multiple-weak-cryptographic-algorithm-vulnerabilities</link>    
  <pubDate>
    Mon, 05 Jun 2023 14:00:03 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MXsecurity Command Injection and Hardcoded Credential Vulnerabilities]]></title>
  <description>
    <![CDATA[<p><b>CVE-2023-33235 (ZDI-CAN-19895)</b><br />
A vulnerability has been reported in the SSH CLI program, which can be exploited by attackers who have gained authorization privileges. The attackers can break out of the restricted shell and subsequently execute arbitrary code.</p>

<p><b>CVE-2023-33236 (ZDI-CAN-19896)</b><br />
A vulnerability has been reported that can be exploited to craft arbitrary JWT tokens and subsequently bypass authentication for web-based APIs.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td>
			<div>Improper Neutralization of Special Elements Used in a Command (&#39;Command Injection&#39;) (CWE-77)</div>

			<div>CVE-2023-33235 (ZDI-CAN-19895)</div>
			</td>
			<td>
			<div>An attacker located remotely who has gained authorization privileges can execute arbitrary commands on the device.</div>
			</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">2</td>
			<td>
			<div>Use of Hard-coded Credentials (CWE-798)</div>

			<div>CVE-2023-33236 (ZDI-CAN-19896)</div>
			</td>
			<td>
			<div>An attacker may be able to bypass authentication for web-based APIs.</div>
			</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mxsecurity-command-injection-and-hardcoded-credential-vulnerabilities</link>    
  <pubDate>
    Mon, 29 May 2023 12:07:52 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the TCG TPM2.0 Implementations Vulnerable to Memory Corruption (CVE-2023-1017/CVE-2023-1018)]]></title>
  <description>
    <![CDATA[<p paraeid="{a48059dd-0b75-49b2-b61e-83e6963748dd}{39}" paraid="1296339790"><strong>CVE-2023-1017&nbsp;</strong></p>

<p paraeid="{a48059dd-0b75-49b2-b61e-83e6963748dd}{45}" paraid="127102616">An out-of-bounds write vulnerability exists in TPM 2.0&#39;s Module Library allowing writing of a 2-byte data past the end of TPM 2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can execute a denial of service (crashing the TPM chip/process or rendering it unusable) and/or perform arbitrary code execution in the TPM context.&nbsp;</p>

<p paraeid="{a48059dd-0b75-49b2-b61e-83e6963748dd}{75}" paraid="223502069"><strong>CVE-2023-1018&nbsp;</strong></p>

<p paraeid="{a48059dd-0b75-49b2-b61e-83e6963748dd}{81}" paraid="1124329213">An out-of-bounds read vulnerability exists in TPM 2.0&#39;s Module Library allowing a 2-byte read past the end of a TPM 2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM.&nbsp;</p>

<p paraeid="{a48059dd-0b75-49b2-b61e-83e6963748dd}{99}" paraid="1728386452">Moxa is investigating to determine if any of our products are affected by this vulnerability. At the time of publication, none of Moxa&rsquo;s products are affected.&nbsp;</p>

<p paraeid="{a48059dd-0b75-49b2-b61e-83e6963748dd}{127}" paraid="207785681">Moxa&#39;s Product Security Incident Response Team (PSIRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, we will provide an update immediately.&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxa’s-response-regarding-the-tcg-tpm2-0-implementations-vulnerable-to-memory-corruption-cve-2023-1017-cve-2023-1018</link>    
  <pubDate>
    Fri, 24 Mar 2023 16:51:33 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort 6000 Series and Utility Improper Certificate Validation Vulnerabilities ]]></title>
  <description>
    <![CDATA[<p>The following two vulnerabilities affect the NPort 6000 Series and Windows driver manager. An attacker may perform a person-in-the-middle attack and eavesdrop on the secure connection between the NPort 6000 Series and the Windows driver manager.&nbsp;</p>

<div paraeid="{a8b890e4-dc8a-4a83-8136-d1fb5a5a59dd}{72}" paraid="56787286"><strong>CVE-2022-43993&nbsp;</strong></div>

<p paraeid="{a8b890e4-dc8a-4a83-8136-d1fb5a5a59dd}{72}" paraid="56787286">The Windows driver manager software does not perform any certificate verification.&nbsp;</p>

<div paraeid="{a8b890e4-dc8a-4a83-8136-d1fb5a5a59dd}{98}" paraid="1381298448"><strong>CVE-2022-43994&nbsp;</strong></div>

<p paraeid="{a8b890e4-dc8a-4a83-8136-d1fb5a5a59dd}{104}" paraid="1472714346">There is no client certificate verification/authentication performed on the secure connection.&nbsp;<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<div paraeid="{a8b890e4-dc8a-4a83-8136-d1fb5a5a59dd}{161}" paraid="866401262">Improper Certificate Validation (CWE-295)&nbsp;</div>

			<div paraeid="{a8b890e4-dc8a-4a83-8136-d1fb5a5a59dd}{173}" paraid="322258047">CVE-2022-43993&nbsp;</div>
			</td>
			<td style="vertical-align: top;">The Windows driver manager software does not perform any certificate verification. An attacker may execute a person-in-the-middle attack and eavesdrop on the secure connection between the NPort 6000 Series and the Windows driver manager.&nbsp;</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">
			<div paraeid="{a8b890e4-dc8a-4a83-8136-d1fb5a5a59dd}{231}" paraid="631765112">Improper Certificate Validation (CWE-295)&nbsp;</div>

			<div paraeid="{a8b890e4-dc8a-4a83-8136-d1fb5a5a59dd}{237}" paraid="1634227445">CVE-2022-43994&nbsp;</div>
			</td>
			<td style="vertical-align: top;">There is no client certificate verification/authentication performed on the secure connection. An attacker may perform a person-in-the-middle attack and eavesdrop on the secure connection between the NPort 6000 Series and the Windows driver manager.&nbsp;</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-6000-series-and-utility-improper-certificate-validation-vulnerabilities</link>    
  <pubDate>
    Tue, 14 Mar 2023 15:57:14 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the networkd-dispatcher (D-bus) Elevation of Privileges Linux Vulnerability, Nimbuspwn (CVE-2022-29799, CVE-2022-29800)]]></title>
  <description>
    <![CDATA[<p>There are two vulnerabilities in networkd-dispatcher. One vulnerability exists because no functions are sanitized by the OperationalState or the AdministrativeState of networkd-dispatcher. This attack leads to a directory traversal to escape from the &ldquo;/etc/networkd-dispatcher&rdquo; base directory. Another vulnerability known as, time-of-check-time-of-use (TOCTOU) race condition, exists because there is a certain time between the scripts being discovered and them being run. An attacker can take advantage of this vulnerability to replace scripts that networkd-dispatcher believes to be owned by root with scripts that are not.</p>

<p>Moxa is investigating to determine if any of our products are affected by this vulnerability. At the time of publication, none of Moxa&rsquo;s products are affected.</p>

<p>Moxa&#39;s Product Security Incident Response Team (PSIRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxa’s-response-regarding-the-networkd-dispatcher-d-bus-elevation-of-privileges-linux-vulnerability,-nimbuspwn</link>    
  <pubDate>
    Mon, 06 Mar 2023 21:43:31 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the uClibc and uClibc-ng Libraries Have a Monotonically Increasing DNS Transaction ID Vulnerability]]></title>
  <description>
    <![CDATA[<p>The uClibc-ng libraries through to 1.0.40 and uClibc libraries through to 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning.</p>

<p><br />
Moxa is investigating to determine if any of our products are affected by this vulnerability. At the time of publication, none of Moxa&rsquo;s products are affected.</p>

<p><br />
Moxa&#39;s Product Security Incident Response Team (PSIRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/the-uclibc-ng-libraries-through-to-1-0-40-and-uclibc-libraries-through-to-0-9-33-2-use-predictable-dns-transaction-ids-t</link>    
  <pubDate>
    Mon, 13 Feb 2023 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[SDS-3008 Series Multiple Web Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>The SDS-3008 Series web server is affected by multiple vulnerabilities.&nbsp;<br />
-&nbsp;&nbsp; &nbsp;A remote attacker may disclose unauthorized information or perform a denial-of-service attack.<br />
-&nbsp;&nbsp; &nbsp;A remote attacker may execute arbitrary script code in the browser of an unsuspecting user.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Cleartext Transmission of Sensitive Information (CWE-319)<br />
			CVE-2022-40693</td>
			<td style="vertical-align: top;">A cleartext transmission vulnerability exists in the web application functionality of Moxa&rsquo;s SDS-3008 Series Industrial Ethernet switch v2.1. A specially crafted network sniffing tool can lead to disclosure of sensitive information. An attacker can sniff network traffic to trigger this vulnerability.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Insufficient Resource Pool (CWE-410)<br />
			CVE-2022-40224</td>
			<td style="vertical-align: top;">A denial-of-service vulnerability exists in the web server functionality of Moxa&rsquo;s SDS-3008 Series Industrial Ethernet switch v2.1. A specially crafted HTTP message header can lead to a denial-of-service attack. An attacker can send an HTTP request to trigger this vulnerability.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Improper Neutralization of Input During Web Page Generation (CWE-79)<br />
			CVE-2022-41311, CVE-2022-41312, CVE-2022-41313</td>
			<td style="vertical-align: top;">A stored cross-site scripting vulnerability exists in the web application functionality of Moxa&rsquo;s SDS-3008 Series Industrial Ethernet switch v2.1. A specially crafted HTTP request can lead to arbitrary JavaScript code being executed. An attacker can send an HTTP request to trigger this vulnerability.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Information Exposure (CWE-200)<br />
			CVE-2022-40691</td>
			<td style="vertical-align: top;">An information disclosure vulnerability exists in the web application functionality of Moxa&rsquo;s SDS-3008 Series Industrial Ethernet switch v2.1. A specially crafted HTTP request can lead to disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/sds-3008-series-multiple-web-vulnerabilities</link>    
  <pubDate>
    Thu, 02 Feb 2023 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[TN-4900 Series Use of Hard-coded Credentials Vulnerability]]></title>
  <description>
    <![CDATA[<p>An attacker may be able to gain privileges if an embedded credential is used.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Hard-coded Credentials<br />
			(CWE-798)</td>
			<td style="vertical-align: top;">An attacker may be able to gain privileges if an embedded credential is used.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/tn-4900-series-use-of-hard-coded-credentials-vulnerability</link>    
  <pubDate>
    Wed, 11 Jan 2023 15:03:38 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Secure Router EDR and TN Series Improper Input Validation Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Successful exploitation of the improper input validation vulnerability could allow a remote attacker to cause a buffer overflow that crashes the web service.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Improper Input Validation<br />
			(CWE-20)</td>
			<td style="vertical-align: top;">An attacker could craft a HTTP/HTTPS request that is designed to cause the web service to crash.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/secure-router-edr-n-tn-series-improper-input-validation-vulnerabilities</link>    
  <pubDate>
    Tue, 29 Nov 2022 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa UC Series Improper Physical Access Control Vulnerability]]></title>
  <description>
    <![CDATA[<p>Successful exploitation of the improper physical access control vulnerability could allow an attacker who has gained physical access to the device to take full control using the console port.</p>

<p>In order for this vulnerability to be exploited, an attacker has to use a cable to access the device&rsquo;s bootloader menu. Therefore, the device is vulnerable if it is deployed in an area without proper physical security (e.g., in an open space without access control).</p>

<p>Moxa&rsquo;s PSIRT would like to remind organizations to perform a proper impact analysis and risk assessment prior to deploying defensive measures, such as the security patch.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Improper Physical Access Control<br />
			(CVE 2023-1257)</td>
			<td style="vertical-align: top;">An attacker with physical access to the device can restart the device and gain access to its BIOS. Then, command line options can be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device authentication files to create a new user profile and gain full access to the system.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/uc-series-improper-physical-access-control-vulnerability</link>    
  <pubDate>
    Tue, 29 Nov 2022 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Secure Router EDR and TN Series Improper Input Validation Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Successful exploitation of the improper input validation vulnerability could allow a remote attacker to cause a buffer overflow that crashes the web service.</p>

<p><br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Improper Input Validation<br />
			(CWE-20)</td>
			<td style="vertical-align: top;">An attacker could craft a HTTP/HTTPS request that is designed to cause the web service to crash.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/secure-router-edr-and-tn-series-improper-input-validation-vulnerabilities</link>    
  <pubDate>
    Mon, 28 Nov 2022 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[TN-5916 Series Privilege Escalation Vulnerability]]></title>
  <description>
    <![CDATA[<p>The TN-5916 Series contains a flaw that may allow a remote attacker to gain administrative privileges. By editing the cookie&rsquo;s values, an attacker can change their privilege from a regular user to an administrator and submit it back to the site..<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Cookie Modification Privilege Escalation Vulnerability</td>
			<td style="vertical-align: top;">A remote attacker could gain administrative privileges.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/tn-5916-series-privilege-escalation-vulnerability</link>    
  <pubDate>
    Fri, 25 Nov 2022 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Multiple Routers Improper Input Validation Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Exploiting improper authentication and/or input validation vulnerabilities could allow a remote attacker to execute arbitrary code via malicious requests.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">
			<p>Improper Authentication<br />
			(CWE-287)<br />
			CVE-2022-41758</p>
			</td>
			<td style="vertical-align: top;">The web service has a command injection vulnerability that can be exploited without proper authentication.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Improper Input Validation&nbsp;<br />
			(CWE-20)<br />
			CVE-2022-41759</td>
			<td style="vertical-align: top;">The web service has a command injection vulnerability.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/multiple-routers-improper-input-validation-vulnerabilities</link>    
  <pubDate>
    Thu, 24 Nov 2022 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NE-4100T Series Improper Authentication Vulnerability]]></title>
  <description>
    <![CDATA[<p>An improper authentication vulnerability in the NE-4100T Series allows a remote attacker to access the device.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Improper Authentication Vulnerability (CWE-287)</td>
			<td style="vertical-align: top;">A remote attacker could access the device without proper authentication.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/ne-4100t-series-improper-authentication-vulnerability</link>    
  <pubDate>
    Tue, 15 Nov 2022 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[VPort Series Improper Input Validation Vulnerability]]></title>
  <description>
    <![CDATA[<p>Successful exploitation of the improper input validation control could allow a remote attacker to cause the RTSP service to crash.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Multiple Format String (CVE-2022-38157)</td>
			<td style="vertical-align: top;">Successful exploitation of the multiple format string vulnerabilities in Moxa&rsquo;s VPort IP Camera series can crash the RTSP service.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Multiple Buffer Overflows (CVE-2022-31858)</td>
			<td style="vertical-align: top;">Successful exploitation of the multiple buffer overflow vulnerabilities in Moxa&rsquo;s VPort IP Camera series can crash the RTSP service.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">NULL Pointer Dereference Vulnerability (CVE-2022-38159)</td>
			<td style="vertical-align: top;">Successful exploitation of the NULL pointer dereference vulnerability in Moxa&rsquo;s VPort IP Camera series can crash the RTSP service.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/vport-series-improper-input-validation-vulnerability</link>    
  <pubDate>
    Fri, 11 Nov 2022 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the OpenSSL X.509 Email Address 4-byte Buffer Overflow Vulnerability (CVE-2022-3602)]]></title>
  <description>
    <![CDATA[<p>A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. This occurs after the certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failing to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution.<br />
<br />
Moxa has completed our review and determined that none of our products are impacted by this vulnerability.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxa-response-regarding-the-openssl-x-509-email-address-4-byte-buffer-overflow-vulnerability-cve-2022-3602</link>    
  <pubDate>
    Fri, 04 Nov 2022 11:08:40 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the Apache Struts 2 Double OGNL Evaluation Vulnerability]]></title>
  <description>
    <![CDATA[<p>Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software: Apache Struts 2.0.0 - Struts 2.5.25.</p>

<p>Moxa is investigating to determine if any of our products are affected by this vulnerability. At the time of publication, none of Moxa&rsquo;s products are affected.</p>

<p>Moxa&#39;s Product Security Incident Response Team (PSIRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-apache-struts2-double-ognl-evaluation-vulnerability</link>    
  <pubDate>
    Tue, 21 Jun 2022 09:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the Dirty Pipe Vulnerability]]></title>
  <description>
    <![CDATA[<p>A flaw was found in the way the &quot;flags&quot; member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.</p>

<p>Moxa is investigating to determine if any of our products are affected by this vulnerability. At the time of publication, none of Moxa&rsquo;s products are affected.</p>

<p>Moxa&#39;s Product Security Incident Response Team (PSIRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-dirty-pipe-vulnerability</link>    
  <pubDate>
    Fri, 03 Jun 2022 09:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the IPsec ESP Vulnerability]]></title>
  <description>
    <![CDATA[<p>A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.<br />
Moxa is investigating to determine if any of our products are affected by this vulnerability. At the time of publication, none of Moxa&rsquo;s products are affected. Moxa&#39;s Product Security Incident Response Team (PSIRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-ipsec-esp-vulnerability</link>    
  <pubDate>
    Mon, 16 May 2022 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MXview Privilege Escalation Vulnerability]]></title>
  <description>
    <![CDATA[<p>A remote code execution (RCE) vulnerability since MXview v3.0 allows attackers with local privilege to gain system privilege and execute arbitrary code via a crafted module.</p>

<p><br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td style="vertical-align:top;">1</td>
			<td style="vertical-align:top;">Improper Control of Generation of<br />
			Code (CWE-94)</td>
			<td style="vertical-align:top;">Attackers with local privilege could gain system privilege<br />
			to execute arbitrary code via a crafted module.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mxview-privilege-escalation-vulnerability</link>    
  <pubDate>
    Tue, 03 May 2022 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the Spring Shell Vulnerability (CVE-2022-22965)]]></title>
  <description>
    <![CDATA[<p>The vulnerability impacts Spring MVC and Spring WebFlux applications running on JDK 9+. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.</p>

<p>Moxa is investigating to determine if any of our products are affected by this vulnerability. At the time of publication, none of Moxa&rsquo;s products are affected.</p>

<p>Moxa&#39;s Product Security Incident Response Team (PSIRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-spring-shell-vulnerability-cve-2022-22965</link>    
  <pubDate>
    Tue, 19 Apr 2022 12:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Suggestions for Enhancing the Security of Moxa’s Products]]></title>
  <description>
    <![CDATA[<p>Moxa has recently been made aware that unauthorized users have accessed Moxa&rsquo;s products by using the default password. Moxa would like to remind all users to change the default password to enhance network security.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/suggestions-for-enhancing-the-security-of-moxas-products</link>    
  <pubDate>
    Fri, 25 Mar 2022 14:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MXview Series Network Management Software Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s MXview Series Network Management Software. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Use of Hard-coded Credentials<br />
			(CWE-798)<br />
			CVE-2021-40390</td>
			<td style="vertical-align: top;">An attacker can send a specially-crafted HTTP request and gain unauthorized access.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Cleartext Transmission of Sensitive Information (CWE-319)<br />
			CVE-2021-40392</td>
			<td style="vertical-align: top;">An attacker can sniff network traffic to exploit sensitive information.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mxview-network-management-software-vulnerabilities-(1)</link>    
  <pubDate>
    Thu, 17 Mar 2022 12:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MGate MB3170/MB3270/MB3280/MB3480 Series Protocol Gateways Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s MGate MB3170/MB3270/MB3280/MB3480 Series Protocol Gateways. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Channel Accessible by Non-Endpoint (CWE-300)</td>
			<td style="vertical-align: top;">Allows an attacker to perform a man-in-the-middle (MITM) attack on the device.</td>
		</tr>
	</thead>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mgate-mb3170-mb3270-mb3280-mb3480-protocol-gateways-vulnerability</link>    
  <pubDate>
    Thu, 17 Feb 2022 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-G903, EDR-G902, and EDR-810 Series Secure Routers Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s EDR-G903 Series, EDR-G902 Series, and EDR-G810 Series Secure Routers. In response to this, Moxa has developed related solutions to address this vulnerability.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Hard-coded Credentials (CWE-798)</td>
			<td style="vertical-align: top;">Use of embedded credential may allow an attacker to access the device by a crafted credential.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-g903-g902-810-secure-routers-vulnerability-(1)</link>    
  <pubDate>
    Fri, 11 Feb 2022 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the Apache Log4j Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>A logging tool, Log4j is vulnerable to the following issues: CVE-2017-5645, CVE-2020-9488, CVE-2021-44228, CVE-2021-44832, CVE-2021-45046, and CVE-2021-45105. For the detailed information of these vulnerabilities, please refer to the <a href="https://logging.apache.org/log4j/2.x/security.html">Description</a> section of the Apache Log4j Security Vulnerabilities page.</p>

<p>At the time of publication, none of Moxa&rsquo;s products are affected by these vulnerabilities.</p>

<p>Moxa&#39;s Product Security Incident Response Team (PSIRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxa-s-response-regarding-the-apache-log4j-vulnerability</link>    
  <pubDate>
    Thu, 27 Jan 2022 12:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[VPort 06EC-2V Series and VPort 461A Series IP Cameras and Video Servers Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s VPort 06EC-2V Series IP Cameras and VPort 461A Series Video Servers. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">NULL Pointer Dereference</td>
			<td style="vertical-align: top;">The application allows a cookie parameter to consist of only digits, which makes it easier for an attacker to perform a brute force attack bypassing authentication and gaining access to device functions.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Integer Underflow</td>
			<td style="vertical-align: top;">An attacker may be able to edit the element of an HTTP request&nbsp; causing the device to become unavailable.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Out-of-Bounds Read</td>
			<td style="vertical-align: top;">An attacker may be able to edit the element of an HTTP request to read sensitive information or even cause the device to become unavailable.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Memory Leak</td>
			<td style="vertical-align: top;">Continuously sending crafted packets may cause an affected device to experience a memory leak and consume the remaining memory on the device.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/vport-06ec-2v-vport-461a-ip-cameras-video-servers-vulnerabilities</link>    
  <pubDate>
    Thu, 13 Jan 2022 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-G903, EDR-G902, and EDR-810 Series Secure Routers Vulnerability]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s EDR-G903, EDR-G902, and EDR-810 Series. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Memory Leak</td>
			<td style="vertical-align: top;">Continuously sending crafted packets may cause an affected device to experience a memory leak and fail to release memory when it is no longer required.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-g903-g902-810-secure-routers-vulnerability</link>    
  <pubDate>
    Thu, 06 Jan 2022 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa's Response Regarding the dnsmasq Vulnerability]]></title>
  <description>
    <![CDATA[<p>Moxa has studied a report by JSOF research labs that disclosed a set of vulnerabilities (known as &lsquo;DNSpooq&rsquo;) in dnsmasq. There are two types of DNSpooq vulnerabilities: buffer overflow and DNS response validation issues. Buffer overflow (CVE-2020-25681, CVE-2020-25682, CVE-2020-25683 and CVE-2020-25687) might lead to remote code execution and DoS attacks; and DNS response validation issues (CVE-2020-25684, CVE-2020-25685, and CVE-2020-25686) are vulnerable to DNS cache poisoning.</p>

<p>Moxa has investigated the vulnerabilities and has determined that the vulnerabilities affect AWK-3131A/4131A/1137C/1131A Series. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/vulnerabilities-in-dnsmasq-affecting-awk-3131a-4131a-1137c-1131a-series</link>    
  <pubDate>
    Thu, 06 Jan 2022 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[AWK-3131A/4131A/1131A/1137C Series Wireless  AP/Bridge/Client Vulnerabilities ]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s AWK-3131A/4131A/1131A/1137C Series Wireless AP/Bridge/Client. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Command Injection for Authentication (CWE-77),&nbsp;CVE-2021-37752</td>
			<td style="vertical-align: top;">An attacker located remotely can execute arbitrary commands on the device via a web interface.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Authentication Bypass and Unencrypted Credentials<br />
			(CWE-303, CWE-256),&nbsp;CVE-2021-37753, CVE-2021-37755</td>
			<td style="vertical-align: top;">An attacker located remotely can bypass authentication mechanisms.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Improper Restriction That Causes Buffer Overflow<br />
			(CWE-119),&nbsp;CVE-2021-37757</td>
			<td style="vertical-align: top;">An attacker located remotely can crash the service of the devices.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Reveals Sensitive Information to an Unauthorized Actor (CWE-204),&nbsp;CVE-2021-37751</td>
			<td style="vertical-align: top;">An attacker located remotely can obtain sensitive information.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">Improper Restriction of Excessive Authentication Attempts<br />
			(CWE-307),&nbsp;CVE-2021-37754</td>
			<td style="vertical-align: top;">An attacker located remotely can use brute force to obtain credentials.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top;">Cross-site scripting (XSS)<br />
			(CWE-79),&nbsp;CVE-2021-37756</td>
			<td style="vertical-align: top;">An attacker located remotely can insert HTML and JavaScript into the system via a web interface.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top;">Improper Verification of Firmware<br />
			(CWE-347),&nbsp;CVE-2021-37758</td>
			<td style="vertical-align: top;">An attacker can create malicious firmware for the device.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/awk-3131a-4131a-1131a-1137c-wireless-ap-bridge-client-vulnerabilities</link>    
  <pubDate>
    Thu, 30 Dec 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[OnCell G3150A/G3470A Series and WDR-3124A Series Cellular Gateways/Router Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s OnCell G3150A/G3470A Series and WDR-3124A Series Cellular Gateways/Router. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Command Injection for Authentication (CWE-77), CVE-2021-37752</td>
			<td style="vertical-align: top;">An attacker located remotely can execute arbitrary commands on the device via a web interface.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Authentication Bypass and Unencrypted Credentials<br />
			(CWE-303, CWE-256), CVE-2021-37753, CVE-2021-37755</td>
			<td style="vertical-align: top;">An attacker located remotely can bypass authentication mechanisms.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Improper Restriction That Causes Buffer Overflow<br />
			(CWE-119), CVE-2021-37757</td>
			<td style="vertical-align: top;">An attacker located remotely can crash the service of the devices.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Reveals Sensitive Information to an Unauthorized Actor (CWE-204), CVE-2021-37751</td>
			<td style="vertical-align: top;">An attacker located remotely can obtain sensitive information.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">Improper Restriction of Excessive Authentication Attempts<br />
			(CWE-307), CVE-2021-37754</td>
			<td style="vertical-align: top;">An attacker located remotely can use brute force to obtain credentials.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top;">Improper Verification of Firmware<br />
			(CWE-347), CVE-2021-37758</td>
			<td style="vertical-align: top;">An attacker can create malicious firmware for the device.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/oncell-g3150a-g3470-wdr-3124a-cellular-gateways-router-vulnerabilities</link>    
  <pubDate>
    Thu, 30 Dec 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[TAP-213/TAP-323 Series Wireless AP/Bridge/Client Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s TAP-213/TAP-323 Series Wireless AP/Bridge/Client. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Command Injection for Authentication (CWE-77), CVE-2021-37752</td>
			<td style="vertical-align: top;">An attacker located remotely can execute arbitrary commands on the device via a web interface.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Authentication Bypass and Unencrypted Credentials<br />
			(CWE-303, CWE-256), CVE-2021-37753, CVE-2021-37755</td>
			<td style="vertical-align: top;">An attacker located remotely can bypass authentication mechanisms.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Improper Restriction That Causes Buffer Overflow<br />
			(CWE-119), CVE-2021-37757</td>
			<td style="vertical-align: top;">An attacker located remotely can crash the service of the devices.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Reveals Sensitive Information to an Unauthorized Actor (CWE-204), CVE-2021-37751</td>
			<td style="vertical-align: top;">An attacker located remotely can obtain sensitive information.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">Improper Restriction of Excessive Authentication Attempts<br />
			(CWE-307), CVE-2021-37754</td>
			<td style="vertical-align: top;">An attacker located remotely can use brute force to obtain credentials.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top;">Cross-site scripting (XSS)<br />
			(CWE-79), CVE-2021-37756</td>
			<td style="vertical-align: top;">An attacker located remotely can insert HTML and JavaScript into the system via a web interface.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top;">Improper Verification of Firmware<br />
			(CWE-347), CVE-2021-37758</td>
			<td style="vertical-align: top;">An attacker can create malicious firmware for the device.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/tap-213-tap-323-series-wireless-ap-bridge-client-vulnerabilities</link>    
  <pubDate>
    Thu, 30 Dec 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MGate 5109 and MGate 5101-PBM-MN Series Protocol Gateways Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s MGate 5109 and MGate 5101-PBM-MN Series Protocol Gateways. In response to this, Moxa has developed related solutions to address this vulnerability.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Memory Leak</td>
			<td style="vertical-align: top;">Continuously sending crafted packets may cause an affected device to experience a memory leak and fail to release memory when it is no longer required.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mgate-5109-5101-protocol-gateways-vulnerability</link>    
  <pubDate>
    Tue, 28 Dec 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[TN-5900 Series Secure Routers Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s TN-5900 Series Secure Routers. In response to this, Moxa has developed related solutions to address this vulnerability.&nbsp;<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Memory Leak</td>
			<td style="vertical-align: top;">Continuously sending crafted packets may cause an affected device to experience a memory leak and fail to release memory when it is no longer required.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/tn-5900-secure-routers-vulnerability</link>    
  <pubDate>
    Tue, 28 Dec 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[TN-5900 Series Secure Routers Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s TN-5900 Series Secure Routers. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Firmware has weak algorithm to protect the integrity of the device</td>
			<td style="vertical-align: top;">An attacker could easily modify the firmware and avoid the inspection mechanism.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Command injection</td>
			<td style="vertical-align: top;">An attacker could inject malicious code to damage the device.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/tn-5900-secure-routers-vulnerabilities</link>    
  <pubDate>
    Tue, 28 Dec 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MGate MB3180/MB3280/MB3480 Series Protocol Gateways Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s MGate MB3180/MB3280/MB3480 Series. In response to this, Moxa has developed related solutions to address this vulnerability.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Cleartext Transmission of Sensitive Information (CWE-319), CVE-2021-4161</td>
			<td style="vertical-align: top;">Remote attackers can obtain sensitive information.</td>
		</tr>
	</thead>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mgate-mb3180-mb3280-mb3480-protocol-gateways-vulnerability</link>    
  <pubDate>
    Thu, 23 Dec 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort W2150A/W2250A Series Serial Device Servers Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s NPort W2150A/W2250A Series Serial Device Servers. In response to this, Moxa has developed related solutions to address this vulnerability.<br />
<br />
The identified vulnerability type and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Command injection</td>
			<td style="vertical-align: top;">A vulnerability in the web server allows an authorized user with administrator rights to execute code on the root operating system.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-w2150a-w2250a-serial-device-servers-vulnerability</link>    
  <pubDate>
    Tue, 14 Dec 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the InterNiche Stack (INFRA:HALT) Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Security researchers discovered 14 vulnerabilities in the HCC Embedded&rsquo;s InterNiche stack (NicheStack) and NicheLite. As these vulnerabilities involve processing network packets, unauthenticated attackers may use specially crafted network packets to cause a Denial-of-Service (DoS) attack, disclose information, or execute arbitrary code on the target device remotely.<br />
<br />
At the time of publication, none of these vulnerabilities affect Moxa products.<br />
<br />
Moxa&#39;s Cyber Security Response Team (CSRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-interniche-stack-infra-halt-vulnerabilities</link>    
  <pubDate>
    Thu, 02 Dec 2021 09:30:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa's Response Regarding the Realtek AP-Router SDK Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple vulnerabilities have been found in Realtek SDK that can allow remote unauthenticated attackers to compromise the target device and execute arbitrary code with the highest level of privilege.<br />
<br />
At the time of publication, none of these vulnerabilities affect Moxa products.<br />
<br />
Moxa&#39;s Cyber Security Response Team (CSRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-realtek-ap-router-sdk-vulnerabilities</link>    
  <pubDate>
    Thu, 02 Dec 2021 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[ioPAC 8500 and ioPAC 8600 Series (IEC Models) Controllers Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s ioPAC 8500 Series (IEC models) and ioPAC 8600 Series (IEC models) rugged modular programmable controllers. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Relative path traversal (CWE23) CVE-2020-25176</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">It is possible for an unauthenticated attacker located remotely to traverse an application&rsquo;s directory, which could lead to remote code execution.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Cleartext transmission of sensitive information (CWE-319) CVE-2020-25178</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Data is transferred over this protocol unencrypted, which could allow an attacker located remotely to upload, read, and delete files.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">3</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Use of hard-coded cryptographic key (CWE-321) CVE-2020-25180</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An unauthenticated attacker located remotely could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">4</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Unprotected storage of credentials (CWE-256) CVE-2020-25184</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An unauthenticated attacker at the site could compromise user&rsquo;s passwords, resulting in information disclosure.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/iopac-8500-and-iopac-8600-series-iec-models-controllers-vulnerabilities</link>    
  <pubDate>
    Wed, 01 Dec 2021 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort IAW5000A-I/O Series Serial Device Servers Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s NPort IAW5000A-I/O Series Servers. In response to this, Moxa has developed related solutions to address these vulnerabilities..<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Use of a Hard-coded Cryptographic Key in Firmware (CWE-321), Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)<br />
			BDU:2021-05559</td>
			<td style="vertical-align: top;">Malicious users can gain access through a hard-coded password.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Use of Hard-coded Cryptographic Key in Program Module (CWE-321)<br />
			BDU:2021-05560</td>
			<td style="vertical-align: top;">The possibility of malicious users encrypting sensitive data through a hard-coded cryptographic key is increased.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Use of Platform-dependent Third-party Components With vulnerabilities (CWE-1103)<br />
			BDU:2021-05561</td>
			<td style="vertical-align: top;">An outdated webserver component may have unfixed vulnerabilities.</td>
		</tr>
	</thead>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-iaw5000a-io-serial-device-servers-vulnerabilities-(1)</link>    
  <pubDate>
    Tue, 23 Nov 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[ioLogik E2200 Series Controllers and I/Os, and ioAdmin Configuration Utility Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s ioLogik E2200 Series Controllers and I/Os, and ioAdmin Configuration Utility. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types for the ioLogik E2200 Series and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Improper Authentication (CWE-285) and Use of Client-side Authentication (CWE-603)<br />
			BDU:2021-05548</td>
			<td style="vertical-align: top;">An attacker can form a special network package to obtain authorization information or even bypass the authentication check.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Use of Hard-coded Password (CWE-259)<br />
			BDU:2021-05549</td>
			<td style="vertical-align: top;">Malicious users can gain access through the hard-coded password.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Improper Access Control (CWE-284)<br />
			BDU:2021-05550</td>
			<td style="vertical-align: top;">Does not restrict or incorrectly restricts unauthorized access.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Stack-based Buffer Overflow (CWE-121)<br />
			BDU:2021-05551</td>
			<td style="vertical-align: top;">A buffer overflow in the built-in web server allows remote attackers to initiate a DoS attack and execute arbitrary code (RCE).</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">Buffer Copy Without Checking Size of Input (CWE-120)<br />
			BDU:2021-05552</td>
			<td style="vertical-align: top;">A buffer overflow in the built-in web server allows remote attackers to initiate a DoS attack.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top;">Stack-based Buffer Overflow (CWE-121) and potential Improper Authorization (CWE-285)<br />
			BDU:2021-05553</td>
			<td style="vertical-align: top;">A buffer overflow in the built-in web server allows remote attackers to initiate a DoS attack and execute arbitrary code (RCE), or potentially bypass authorization.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top;">Stack-based Buffer Overflow (CWE-121) and potential Improper Authorization (CWE-285)<br />
			BDU:2021-05554</td>
			<td style="vertical-align: top;">A buffer overflow in the built-in web server allows remote attackers to initiate a DoS attack and execute arbitrary code (RCE), or potentially bypass authorization.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">8</td>
			<td style="vertical-align: top;">Stack-based Buffer Overflow (CWE-121) and potential Improper Authorization (CWE-285)<br />
			BDU:2021-05555</td>
			<td style="vertical-align: top;">A buffer overflow in the built-in web server allows remote attackers to initiate a DoS attack and execute arbitrary code (RCE), or potentially bypass authorization.</td>
		</tr>
	</thead>
</table>
</div>

<p><br />
The identified vulnerability types for ioAdmin Configuration Utility and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">9</td>
			<td style="vertical-align: top;">Weak Password Requirements (CWE-521)<br />
			BDU:2021-05556</td>
			<td style="vertical-align: top;">Weak password requirements may allow an attacker to use brute force to gain access to the device.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">10</td>
			<td style="vertical-align: top;">Improper Restriction of Excessive Authentication Attempts (CWE-307)<br />
			BDU:2021-05557</td>
			<td style="vertical-align: top;">Weak password requirements may allow an attacker to use brute force to gain access to the device.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">11</td>
			<td style="vertical-align: top;">Cleartext Storage of Sensitive Information in Memory (CWE-316)<br />
			BDU:2021-05558</td>
			<td style="vertical-align: top;">An attacker can use malware to obtain sensitive data stored in the device&rsquo;s memory.<br />
			&nbsp;</td>
		</tr>
	</thead>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/iologik-e2200-ioadmin-configuration-utility-vulnerabilities</link>    
  <pubDate>
    Tue, 23 Nov 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MGate MB3180/MB3280/MB3480 Series Protocol Gateways Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s MGate MB3180/MB3280/MB3480 Series. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Denial-of-service attack<br />
			CVE-2021-33823</td>
			<td style="vertical-align: top;">An attacker could perform a denial-of-service attack by flooding the device with packets and exhausting the web servers&rsquo; resources.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Denial-of-service attack<br />
			CVE-2021-33824</td>
			<td style="vertical-align: top;">An attacker could perform a denial-of-service attack by sending incomplete packets to exhaust the web servers&rsquo; resources.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mgate-mb3180-3280-3480-protocol-gateways-vulnerabilities</link>    
  <pubDate>
    Fri, 17 Sep 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[ MXview Series Network Management Software Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s MXview Series. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 229px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top;">Misconfigured service allows remote connections to internal communication channels.</td>
			<td style="vertical-align: top;">Allows unwanted users to interact and use MQTT remotely.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Use of hard-coded, default passwords (CWE-259).</td>
			<td style="vertical-align: top;">If hard-coded passwords are used, malicious users can gain access through the account that uses default passwords.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Remote code execution through improper neutralization of special elements.</td>
			<td style="vertical-align: top;">Attackers could execute unauthorized commands, which could then be used to disable the software, or read and modify data for which the attacker should not be able to access directly.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">RCE through improper limitation of a pathname to a restricted directory<br />
			(&#39;Path Traversal&#39;) (CWE-22).</td>
			<td style="vertical-align: top;">An attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">An unauthenticated user can read files through improper limitation of a pathname to a restricted directory (&#39;Path Traversal&#39;) (CWE-22).</td>
			<td style="vertical-align: top;">An attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top;">An unauthenticated user can read files through improper limitation of a pathname to a restricted directory (&#39;Path Traversal&#39;) (CWE-22).</td>
			<td style="vertical-align: top;">An attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top;">Files can be read through improper limitation of a pathname to a restricted directory (&#39;Path Traversal&#39;) (CWE-22).</td>
			<td style="vertical-align: top;">An attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">8</td>
			<td style="vertical-align: top;">Files can be edited through improper limitation of a pathname to a restricted directory (&#39;Path Traversal&#39;) (CWE-22).</td>
			<td style="vertical-align: top;">An attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">9</td>
			<td style="vertical-align: top;">Password leakage through unprotected transport of credentials (CWE-523).</td>
			<td style="vertical-align: top;">An attacker may be able to gain access to privileges or assume the identity of another user.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mxview-network-management-software-vulnerabilities</link>    
  <pubDate>
    Fri, 17 Sep 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[OnCell G3470A-LTE and WDR-3124A Series Cellular Gateways/Router Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s OnCell G3470A-LTE and WDR-3124A Series Cellular/Router. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 246px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 364px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top; width: 246px;">Improper Restriction of Operations Within the Bounds of a Memory Buffer<br />
			CVE-2016-2148</td>
			<td style="vertical-align: top; width: 364px;">Heap-based buffer overflow may allow a remote attack in the DHCP client.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top; width: 246px;">Improper Input Validation<br />
			CVE-2016-7406</td>
			<td style="vertical-align: top; width: 364px;">Allows remote attackers to execute arbitrary code in the dropbear SSH function.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top; width: 246px;">Multiple vulnerabilities including buffer overflow, integer overflow etc.<br />
			CVE-2012-4412, CVE-2014-5119,<br />
			CVE-2014-9402, CVE-2014-9984,<br />
			CVE-2018-6485, CVE-2015-7547<br />
			CVE-2015-0235</td>
			<td style="vertical-align: top; width: 364px;">Vulnerabilities on outdated GNU C Library (glibc) may allow an attacker to cause different impacts remotely including denial of service and arbitrary code execution.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top; width: 246px;">Multiple vulnerabilities including improper restriction of operations, uncontrolled resource consumption, null pointer dereference, buffer overflow, out-of-bounds write, privilege controls, cross-site-scripting etc.<br />
			CVE-2008-4609, CVE-2009-1298,<br />
			CVE-2010-1162, CVE-2010-4251,<br />
			CVE-2010-4805, CVE-2011-0709,<br />
			CVE-2011-2525, CVE-2012-0207,<br />
			CVE-2012-2136, CVE-2012-3552,<br />
			CVE-2012-6638, CVE-2012-6701,<br />
			CVE-2012-6704, CVE-2013-7470,<br />
			CVE-2014-2523, CVE-2015-1465,<br />
			CVE-2015-5364, CVE-2016-10229,<br />
			CVE-2016-3134, CVE-2016-4997,<br />
			CVE-2016-7039, CVE-2016-7117,<br />
			CVE-2016-8666, CVE-2017-1000111<br />
			CVE-2017-11176, CVE-2017-7618,<br />
			CVE-2017-8890, CVE-2019-16746,<br />
			CVE-2019-3896, CVE-2010-3848,<br />
			CVE-2012-0056, CVE-2010-2692</td>
			<td style="vertical-align: top; width: 364px;">Vulnerabilities on outdated Linux kernel that may allow an attacker to cause different impacts remotely including denial of service, memory consumption by sending large amounts of traffic, privilege escalation, inject arbitrary commands etc.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top; width: 246px;">Use of Hard-coded Cryptographic Key<br />
			(&quot;House of Keys&quot; vulnerability)</td>
			<td style="vertical-align: top; width: 364px;">Embedded devices using non-unique X.509 certificates and SSH host keys can be leveraged in impersonation, man-in-the-middle, or passive decryption attacks.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top; width: 246px;">Multiple vulnerabilities including resource management error, buffer overflow, improper authentication, improper input validation etc.<br />
			CVE-2006-2937, CVE-2006-2940,<br />
			CVE-2006-3738, CVE-2009-3245,<br />
			CVE-2010-0742, CVE-2010-3864,<br />
			CVE-2010-4252, CVE-2012-2110,<br />
			CVE-2014-3512, CVE-2014-3567,<br />
			CVE-2014-8176, CVE-2015-0292,<br />
			CVE-2016-2108, CVE-2016-2109</td>
			<td style="vertical-align: top; width: 364px;">Vulnerabilities on an outdated OpenSSL module that may allow an attacker to remotely perform a denial-of-service attack or execute arbitrary code etc.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top; width: 246px;">Hardcoded password hashes<br />
			CVE-2016-8717</td>
			<td style="vertical-align: top; width: 364px;">Use of a hard-coded cryptographic key may increase the possibility of unauthorized access.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">8</td>
			<td style="vertical-align: top; width: 246px;">Authenticated Command Injection<br />
			CVE-2021-39279</td>
			<td style="vertical-align: top; width: 364px;">A specially crafted command can cause privilege escalation and circumvent the operating system&#39;s user access controls.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">9</td>
			<td style="vertical-align: top; width: 246px;">Reflected Cross-site scripting via manipulated config-file<br />
			CVE-2021-39278</td>
			<td style="vertical-align: top; width: 364px;">Allows an attacker to import a malicious config file to the device through the web interface.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/oncell-g3470a-wdr-3124a-cellular-gateways-router-vulnerabilities</link>    
  <pubDate>
    Wed, 01 Sep 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[TAP-323, WAC-1001, and WAC-2004 Series Wireless AP/Bridge/Client Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s TAP-323 Series and WAC-1001/2004 Series Railway Wireless Controllers. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 62px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 246px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 364px; text-align: left; height: 18px;">Impact</th>
		</tr>
		<tr>
			<td style="vertical-align: top;">1</td>
			<td style="vertical-align: top; width: 246px;">Improper Restriction of Operations Within the Bounds of a Memory Buffer<br />
			CVE-2016-2148</td>
			<td style="vertical-align: top; width: 364px;">Heap-based buffer overflow may allow a remote attack in the DHCP client.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top; width: 246px;">Improper Input Validation<br />
			CVE-2016-7406</td>
			<td style="vertical-align: top; width: 364px;">Allows remote attackers to execute arbitrary code in the dropbear SSH function.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top; width: 246px;">Multiple vulnerabilities including buffer overflow, integer overflow etc.<br />
			CVE-2012-4412, CVE-2014-5119,<br />
			CVE-2014-9402, CVE-2014-9984,<br />
			CVE-2018-6485, CVE-2015-7547<br />
			CVE-2015-0235</td>
			<td style="vertical-align: top; width: 364px;">Vulnerabilities on outdated GNU C Library (glibc) may allow an attacker to cause different impacts remotely including denial of service and arbitrary code execution.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top; width: 246px;">Multiple vulnerabilities including improper restriction of operations, uncontrolled resource consumption, null pointer dereference, buffer overflow, out-of-bounds write, privilege controls, cross-site-scripting etc.<br />
			CVE-2008-4609, CVE-2009-1298,<br />
			CVE-2010-1162, CVE-2010-4251,<br />
			CVE-2010-4805, CVE-2011-0709,<br />
			CVE-2011-2525, CVE-2012-0207,<br />
			CVE-2012-2136, CVE-2012-3552,<br />
			CVE-2012-6638, CVE-2012-6701,<br />
			CVE-2012-6704, CVE-2013-7470,<br />
			CVE-2014-2523, CVE-2015-1465,<br />
			CVE-2015-5364, CVE-2016-10229,<br />
			CVE-2016-3134, CVE-2016-4997,<br />
			CVE-2016-7039, CVE-2016-7117,<br />
			CVE-2016-8666, CVE-2017-1000111<br />
			CVE-2017-11176, CVE-2017-7618,<br />
			CVE-2017-8890, CVE-2019-16746,<br />
			CVE-2019-3896, CVE-2010-3848,<br />
			CVE-2012-0056, CVE-2010-2692</td>
			<td style="vertical-align: top; width: 364px;">Vulnerabilities on outdated Linux kernel that may allow an attacker to cause different impacts remotely including denial of service, memory consumption by sending large amounts of traffic, privilege escalation, inject arbitrary commands etc.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top; width: 246px;">Use of Hard-coded Cryptographic Key<br />
			(&quot;House of Keys&quot; vulnerability)</td>
			<td style="vertical-align: top; width: 364px;">Embedded devices using non-unique X.509 certificates and SSH host keys can be leveraged in impersonation, man-in-the-middle, or passive decryption attacks.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top; width: 246px;">Multiple vulnerabilities including resource management error, buffer overflow, improper authentication, improper input validation etc.<br />
			CVE-2006-2937, CVE-2006-2940,<br />
			CVE-2006-3738, CVE-2009-3245,<br />
			CVE-2010-0742, CVE-2010-3864,<br />
			CVE-2010-4252, CVE-2012-2110,<br />
			CVE-2014-3512, CVE-2014-3567,<br />
			CVE-2014-8176, CVE-2015-0292,<br />
			CVE-2016-2108, CVE-2016-2109</td>
			<td style="vertical-align: top; width: 364px;">Vulnerabilities on an outdated OpenSSL module that may allow an attacker to remotely perform a denial-of-service attack or execute arbitrary code etc.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top; width: 246px;">Hardcoded password hashes<br />
			CVE-2016-8717</td>
			<td style="vertical-align: top; width: 364px;">Use of a hard-coded cryptographic key may increase the possibility of unauthorized access.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">8</td>
			<td style="vertical-align: top; width: 246px;">Authenticated Command Injection<br />
			CVE-2021-39279</td>
			<td style="vertical-align: top; width: 364px;">A specially crafted command can cause privilege escalation and circumvent the operating system&#39;s user access controls.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">9</td>
			<td style="vertical-align: top; width: 246px;">Reflected Cross-site scripting via manipulated config-file<br />
			CVE-2021-39278</td>
			<td style="vertical-align: top; width: 364px;">Allows an attacker to import a malicious config file to the device through the web interface.</td>
		</tr>
	</thead>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/tap-323-wac-1001-2004-wireless-ap-bridge-client-vulnerabilities</link>    
  <pubDate>
    Wed, 01 Sep 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-810 Series Secure Router Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s EDR-810 Series secure router. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table" style="width: 820px;">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Use of a broken or risky cryptographic algorithm</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Using a weak cryptographic algorithm may allow confidential information to be disclosed.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Stack-based Buffer Overflow</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker can exploit this vulnerability to perform remote code execution without being verified.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Improper neutralization of special elements used in an OS Command</td>
			<td style="vertical-align: top;">An attacker who is authenticated as a user with low privileges can exploit a vulnerability and send multiple remote command injections.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Use of a hard-coded cryptographic key</td>
			<td style="vertical-align: top;">Using a hard-coded cryptographic key may increase the possibility that confidential data can be recovered.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-810-series-security-router-vulnerabilities-(2)</link>    
  <pubDate>
    Tue, 17 Aug 2021 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDS-405A Series Ethernet Switches Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s EDS-405A Series. In response to this, Moxa has developed a related solution to address the vulnerability.<br />
<br />
The identified vulnerability type and potential impacts are shown below:</p>

<div class="module-block__table" style="width: 820px;">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 204px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 422px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 204px; height: 18px;">Stack-based buffer overflow</td>
			<td class="border-table__td" style="width: 422px; height: 18px;">
			<ol>
				<li>The attacker may execute arbitrary codes or target the device to cause it to go out of service.</li>
				<li>The password verification mechanism is vulnerable to buffer overflows and the attacker may use this vulnerability to cause denial-of-service.</li>
			</ol>
			</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/eds-405a-series-ethernet-switches-vulnerability</link>    
  <pubDate>
    Mon, 09 Aug 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort IAW5000A-I/O Series Serial Device Server Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s NPort IAW5000A-I/O Series Wireless Device Server. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table" style="width: 820px;">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Buffer Overflow (CWE-120)<br />
			BDU:2021-02699, BDU:2021-02702</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A buffer overflow in the built-in web server allows remote attackers to initiate a DoS attack.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Stack-Based Buffer Overflow (CWE-121)<br />
			BDU:2021-02700, BDU:2021-02701, BDU:2021-02703, BDU:2021-02704, BDU:2021-02708</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A buffer overflow in the built-in web server allows remote attackers to initiate a DoS attack and execute arbitrary code (RCE).</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Improper Input Validation (CWE-20)<br />
			BDU:2021-02705, BDU:2021-02706</td>
			<td style="vertical-align: top;">Data can be copied without validation in the built-in web server, which allows remote attackers to initiate a DoS attack.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">OS Command Injection (CWE-78)<br />
			BDU:2021-02707</td>
			<td style="vertical-align: top;">Improper input validation in the built-in web server allows remote attackers to execute the OS command.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-iaw5000a-io-serial-device-server-vulnerabilities</link>    
  <pubDate>
    Thu, 27 May 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort IA5000A Series Serial Device Servers Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s NPort IA5000A Series Serial Device Servers. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 798px; height: 359px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 261px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 365px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 261px; height: 18px;">Improper Access Control (CWE-284)<br />
			CVE-2020-27149, KLCERT-20-018</td>
			<td class="border-table__td" style="width: 365px; height: 18px;">Attackers can exploit this vulnerability to elevate the privilege level of the user controlled by them or to receive requests that require a higher privilege level.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 261px; height: 18px;">Unprotected Storage of Credentials (CWE-256)<br />
			CVE-2020-27150, KLCERT-20-019</td>
			<td class="border-table__td" style="width: 365px; height: 18px;">An attacker can extract authentication credentials from a configuration file sent over an insecure communication channel. The data extracted can subsequently be used to authenticate via Moxa Service and change the device&rsquo;s configurations.</td>
		</tr>
		<tr>
			<td style="vertical-align: top; height: 83px;">3</td>
			<td style="vertical-align: top; width: 261px; height: 83px;">Cleartext Transmission of Sensitive Information (CWE-319)<br />
			CVE-2020-27184, KLCERT-20-020</td>
			<td style="vertical-align: top; width: 365px; height: 83px;">An attacker could read all data transferred between the client and the device if the communication is carried out over Telnet, including authentication credentials, device configuration data, the device version, and other sensitive data.</td>
		</tr>
		<tr>
			<td style="vertical-align: top; height: 92px;">4</td>
			<td style="vertical-align: top; width: 261px; height: 92px;">Cleartext Transmission of Sensitive Information (CWE-319)<br />
			CVE-2020-27185, KLCERT-20-021</td>
			<td style="vertical-align: top; width: 365px; height: 92px;">Successfully exploiting this vulnerability could enable attackers to read all traffic sent when Moxa Service is enabled. This includes authentication data, device configurations, the device version, and other sensitive data.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities</link>    
  <pubDate>
    Wed, 28 Apr 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-810 Series Secure Router Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s EDR-810 industrial secure router. In response to this, Moxa has developed related solutions to address the vulnerability.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table" style="width: 810px;">
<table class="border-table" style="width: 635px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="text-align: left; height: 18px; width: 195px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 369px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="height: 18px; width: 195px;">Improper Input Validation<br />
			CVE-2014-2284, BDU:2015-07052</td>
			<td class="border-table__td" style="width: 369px; height: 18px;">Crafted packets could potentially stop the SNMP operation of the EDR-810 series.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="height: 18px; width: 195px;">Resource Management Errors<br />
			CVE-2015-1788, BDU:2015-11035</td>
			<td class="border-table__td" style="width: 369px; height: 18px;">Malformed binary polynomial field allows remote attackers to cause a denial of service.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top; width: 195px;">Improper Restriction of Operations within the Bounds of a Memory Buffer<br />
			CVE-2016-10012, BDU:2017-00350</td>
			<td style="vertical-align: top; width: 369px;">SSH connection might allow local users to gain privileges by leveraging access to a sandboxed privilege-separation process.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top; width: 195px;">Exposure of Sensitive Information to an Unauthorized Actor<br />
			CVE-2015-3195, BDU:2016-01654</td>
			<td style="vertical-align: top; width: 369px;">Malformed data might allow remote attackers to obtain sensitive information from process memory by triggering a decoding failure.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top; width: 195px;">Improper Input Validation<br />
			CVE-2016-6515, BDU:2018-00117</td>
			<td style="vertical-align: top; width: 369px;">Crafted string for password authentication might allow remote attackers to cause a denial of service.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top; width: 195px;">Improper Input Validation<br />
			CVE-2017-17562, BDU:2018-00118</td>
			<td style="vertical-align: top; width: 369px;">Crafted HTTP request might allow remote code execution.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top; width: 195px;">Cryptographic Issues<br />
			CVE-2013-0169, BDU:2015-09702</td>
			<td style="vertical-align: top; width: 369px;">Out-of-date TLS protocol might allow remote attackers to conduct distinguishing attacks and plaintext-recovery attacks.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">8</td>
			<td style="vertical-align: top; width: 195px;">Exposure of Sensitive Information to an Unauthorized Actor<br />
			CVE-2016-0703, BDU:2016-00629</td>
			<td style="vertical-align: top; width: 369px;">Out-of-date SSL protocol might allow man-in-the-middle attackers to decrypt TLS ciphertext data.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">9</td>
			<td style="vertical-align: top; width: 195px;">Permissions, Privileges, and Access Controls<br />
			CVE-2013-1813, BDU:2015-09676</td>
			<td style="vertical-align: top; width: 369px;">Improper operation of authorized users may cause local users to have unknown impact and attack vectors via console.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">10</td>
			<td style="vertical-align: top; width: 195px;">Numeric Errors<br />
			CVE-2010-2156, BDU:2018-00784</td>
			<td style="vertical-align: top; width: 369px;">Crafted DHCP packets might allow remote attackers to cause a denial of service.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-810-series-security-router-vulnerabilities-(1)</link>    
  <pubDate>
    Tue, 23 Mar 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[VPort 06EC-2V Series IP Cameras Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s VPort 06EC-2V Series IP Cameras. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table" style="width: 820px;">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>NULL Pointer Dereference</p>

			<p>CVE-2021-25845</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The application allows a cookie parameter to consist of only digits, allowing an attacker to perform a brute force attack bypassing authentication and gaining access to device functions.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Integer Underflow</p>

			<p>CVE-2021-25846, CVE-2021-25849,</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker may be able to edit the element of an HTTP request, causing the device to become unavailable.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">
			<p>Out-of-Bounds Read</p>

			<p>CVE-2021-25847, CVE-2021-25848</p>
			</td>
			<td style="vertical-align: top;">An attacker may be able to edit the element of an HTTP request to read sensitive information or even cause the device to become unavailable.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/vport-06ec-2v-series-ip-cameras-vulnerabilities</link>    
  <pubDate>
    Tue, 16 Mar 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa's Response Regarding Sudo Heap-based Buffer Overflow Vulnerability (CVE-2021-3156)]]></title>
  <description>
    <![CDATA[<p>Sudo is a utility included in many Linux-based operating systems that allows a user to run programs with the security privileges of another user. A Heap-based buffer overflow vulnerability has been found on Sudo versions 1.8.2 through 1.8.31p2 and 1.9.0 through 1.9.5p1. An attacker could exploit this vulnerability to take control of an affected system.<br />
<br />
Moxa&#39;s Cyber Security Response Team (CSRT) is fully engaged in this matter and we are taking appropriate action. If there are any updates to the status of the vulnerabilities or how these affect Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxa-response-regarding-sudo-heap-based-buffer-overflow-vulnerability-cve-2021-3156</link>    
  <pubDate>
    Wed, 17 Feb 2021 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the Real Time Automation EtherNet/IP Stack Vulnerability]]></title>
  <description>
    <![CDATA[<p>A vulnerability has been found in the Real Time Automation (RTA) proprietary 449ES EtherNet/IP (ENIP) stacks that could result in a denial-of-service attack or remote code execution. The detailed information can be found <a href="https://www.claroty.com/2020/11/17/blog-research-rta-enip-stack-vulnerability/">here</a>.<br />
<br />
Moxa has investigated this vulnerability and has determined that none of our products are affected.<br />
<br />
Moxa&#39;s Cyber Security Response Team (CSRT) will keep monitoring the situation and if there is any change, an update will be provided immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-rta-enip-stack-vulnerability</link>    
  <pubDate>
    Thu, 31 Dec 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the AMNESIA:33 Vulnerability]]></title>
  <description>
    <![CDATA[<p>A set of vulnerabilities has been found in multiple open source TCP/IP stacks (uIP, FNET, picoTCP, and Nut/Net) that can allow an attacker to corrupt memory, perform remote code execution, leak information, and poison DNS cache. The detailed information can be found <a href="https://www.forescout.com/research-labs/amnesia33/">here</a>.<br />
<br />
Moxa has investigated this vulnerability and has determined that none of our products are currently affected.<br />
<br />
Moxa&#39;s Cyber Security Response Team (CSRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, an update will be provided immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-amnesia33-vulnerability</link>    
  <pubDate>
    Mon, 21 Dec 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MXview Series Network Management Software Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s MXview Series Network Management Software. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Incorrect Default Permissions (CWE-276), CVE-2020-13536, CVE-2020-13537</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker may be able to edit a source file to insert a malicious code to elevate their permissions.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mxview-series-network-management-software-vulnerabilities</link>    
  <pubDate>
    Tue, 03 Nov 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-810 Series Secure Router Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s EDR-810 Series Secure&nbsp;Router. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="height: 306px; width: 693px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 208px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 414px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 208px; height: 18px;">Execute arbitrary command. BDU:2020-01269</td>
			<td class="border-table__td" style="width: 414px; height: 18px;">A crafted request to the web server caused potential risk of executing arbitrary command.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 208px; height: 18px;">Denial of service.&nbsp;&nbsp;&nbsp;&nbsp; BDU:2020-04912</td>
			<td class="border-table__td" style="width: 414px; height: 18px;">A crafted request to the web server caused potential risk of denial-of-service.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top; width: 208px;">No response from system. BDU:2020-04914</td>
			<td style="vertical-align: top; width: 414px;">A crafted request to the device may cause specific parts of the user interface to become unresponsive.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top; width: 208px;">No response from system. BDU:2020-04915</td>
			<td style="vertical-align: top; width: 414px;">A crafted request to the device may cause specific parts of the user interface to become unresponsive.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top; width: 208px;">No response from system. BDU:2020-04916</td>
			<td style="vertical-align: top; width: 414px;">A crafted request to the device may cause specific parts of the user interface to become unresponsive.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top; width: 208px;">No response from system. BDU:2020-04913</td>
			<td style="vertical-align: top; width: 414px;">A crafted request to the device may cause specific parts of the user interface to become unresponsive.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-810-series-security-router-vulnerabilities</link>    
  <pubDate>
    Tue, 03 Nov 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-G903, EDR-G902, and EDR-810 Secure Router Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s EDR-G903, EDR-G902, and EDR-810 Series Secure Router. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Improper Restriction of Operations (CWE-119)，CVE-2020-28144</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Crafted requests sent to the device may cause improper restriction of operations.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-g903-g902-810-secure-router-vulnerability</link>    
  <pubDate>
    Thu, 29 Oct 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort 5100A Series Serial Device Servers Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s NPort 5100A Series Serial Device Server. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Privilege escalation via Web console</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A user with read-only access may get write permissions via editing a JavaScript that will allow them to edit the device settin</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-5100a-series-serial-device-servers-vulnerability-(1)</link>    
  <pubDate>
    Tue, 27 Oct 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort IAW5000A-I/O Series Serial Device Servers Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s NPort IAW5000A-I/O Series Serial Device Servers. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 194px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 431px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 194px; height: 18px;">Session Fixation (CWE-384), BDU-2020-04049, CVE-2020-25198</td>
			<td class="border-table__td" style="width: 431px; height: 18px;">This vulnerability allows an attacker to gain access to a session, and hijack the session by stealing the user&rsquo;s cookies.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top;">Improper Privilege Management<br />
			(CWE-269, CWE-266), BDU-2020-04050, CVE-2020-25194</td>
			<td style="vertical-align: top;">This vulnerability allows a person with user privileges to perform requests with administrative privileges.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Weak Password Requirements<br />
			(CWE-521), BDU-2020-04051, CVE-2020-25153</td>
			<td style="vertical-align: top;">This vulnerability allows users to use weak passwords.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Cleartext Transmission of Sensitive Information<br />
			(CWE-319), BDU-2020-04052, CVE-2020-25190</td>
			<td style="vertical-align: top;">This vulnerability allows the web server to store and transmit the credentials of third-party services in cleartext.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">Improper Restriction Of Excessive Authentication Attempts (CWE-307), BDU-2020-04053, CVE-2020-25196</td>
			<td style="vertical-align: top;">This vulnerability allows a person to use brute force to bypass authentication on a SSH/Telnet session.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top;">Information Exposure<br />
			(CWE-200), BDU-2020-04054, CVE-2020-25192</td>
			<td style="vertical-align: top;">This vulnerability allows an attacker to access sensitive information in the built-in web service without proper authorization.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-iaw5000a-io-serial-device-servers-vulnerabilities</link>    
  <pubDate>
    Thu, 08 Oct 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-810 Series Secure Routers Vulnerability]]></title>
  <description>
    <![CDATA[<p>A vulnerability was identified in Moxa&rsquo;s EDR-810 Series Secure Routers. In response to this, Moxa has developed a solution to address this vulnerability.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 188px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 438px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 188px; height: 18px;">Device information leak</td>
			<td class="border-table__td" style="width: 438px; height: 18px;">Unauthorized users may retrieve the device&rsquo;s basic information such as LAN IP address, Model Name, MAC address, Subnet Mask, and gateway settings.<br />
			<br />
			Note, any sensitive information such as Event logs and Account Settings require authentication and are not affected by this vulnerability.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-810-series-industrial-secure-routers-vulnerability</link>    
  <pubDate>
    Tue, 29 Sep 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the GRUB2 (BootHole) Vulnerability]]></title>
  <description>
    <![CDATA[<p>A vulnerability has been found in Grand Unified Bootloader version 2 (GRUB2) bootloader that can allow an attacker to execute arbitrary code when the system boots up. This vulnerability is sometimes referred to as BootHole and it can affects the GRUB2 bootloader in Windows and Linuxwhen secure boot is being used. This vulnerability has been assigned a CVE ID CVE-2020-10713 and the detailed information can be found <a href="https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/">here</a>.<br />
<br />
Moxa has investigated this vulnerability and has determined that none of our products are currently affected.<br />
<br />
Moxa&#39;s Cyber Security Response Team (CSRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, an update will be provided immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-grub2-boothole-vulnerability</link>    
  <pubDate>
    Tue, 08 Sep 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-G902 Series and EDR-G903 Series Secure Routers Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s EDR-G902 Series and EDR-G903 Series Secure Routers. In response to this, Moxa has developed related solutions to address this vulnerability.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 194px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 431px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 194px; height: 18px;">Stack buffer overflow (CWE-121)<br />
			CVE-2020-14511</td>
			<td class="border-table__td" style="width: 431px; height: 18px;">Malicious operation of the crafted web browser cookie may cause stack buffer overflow in the system web server of the EDR-G902 Series and EDR-G903 Series.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-g902-g903-series-secure-routers-vulnerabilities</link>    
  <pubDate>
    Thu, 16 Jul 2020 15:45:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MGate 5105-MB-EIP Series Protocol Gateways Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple vulnerabilities were identified in Moxa&rsquo;s MGate 5105-MB-EIP Series Protocol Gateways. In response to this, Moxa has developed a solution to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 762px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 281px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 408px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 281px; height: 18px;">Authentication Bypass by Capture-replay<br />
			(CWE-294)<br />
			CVE-2020-15494, ZDI-CAN-10791&nbsp;</td>
			<td class="border-table__td" style="width: 408px; height: 18px;">This vulnerability allows an attacker to obtain the session ID of the connection between the host and the device.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 281px; height: 18px;">Exposure of Sensitive Information to an Unauthorized Actor<br />
			(CEW-200)<br />
			CVE-2020-15493, ZDI-CAN-10792&nbsp;</td>
			<td class="border-table__td" style="width: 408px; height: 18px;">This vulnerability allows an attacker to decrypt the encrypted configuration file of the device.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mgate-5105-mb-eip-series-protocol-gateways-vulnerabilities</link>    
  <pubDate>
    Fri, 10 Jul 2020 15:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the Ripple20 Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>A series of high-risk vulnerabilities has been found in the TCP/IP software library developed by Treck, Inc. These 19 vulnerabilities, labeled Ripple20, can be exploited to perform remote code execution, out-of-bounds read/write, denial-of-service (DoS) attacks, and potentially expose sensitive information. The detailed information can be found on this website: <a href="https://www.jsof-tech.com/ripple20/">https://www.jsof-tech.com/ripple20/</a> and CISA&rsquo;s ICS Advisory: <a href="https://www.us-cert.gov/ics/advisories/icsa-20-168-01">ICSA-20-168-01</a>.</p>

<p>Moxa has investigated this vulnerability and has determined that none of our products are affected.<br />
<br />
Moxa&#39;s Cyber Security Response Team (CSRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, an update will be provided immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-ripple20-vulnerabilities</link>    
  <pubDate>
    Tue, 30 Jun 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[VPort 461 Series Industrial Video Servers Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s VPort 461 Series Industrial Video Servers. In response to this, Moxa has developed a related solution to address the vulnerability.<br />
<br />
The identified vulnerability types and potential impact is shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 194px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 431px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 194px; height: 18px;">
			<p>Command Injection. CVE-2020-23639</p>
			</td>
			<td class="border-table__td" style="width: 431px; height: 18px;">A command injection vulnerability exists in the device that could allow a remote attacker to execute arbitrary commands.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/vport-461-series-industrial-video-servers-vulnerabilities</link>    
  <pubDate>
    Mon, 08 Jun 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort 5100A Series Serial Device Servers Vulnerability]]></title>
  <description>
    <![CDATA[<p>A vulnerability was identified in Moxa&rsquo;s NPort 5100A Series Serial Device Server. In response to this, Moxa has developed related solutions to address this vulnerability.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 689px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313px; height: 18px;">
			<p>Unauthenticated Information Disclosure</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The vulnerability allows an attacker to obtain the serial port configurations of the device without proper authentication.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-5100a-series-serial-device-servers-vulnerability</link>    
  <pubDate>
    Wed, 29 Apr 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the Kr00k Vulnerability]]></title>
  <description>
    <![CDATA[<p>A vulnerability has been found in Broadcom and Cypress Wi-Fi chips that allows unauthorized decryption of some WPA2-encrypted traffic. The detailed information can be found on this website: <a href="https://www.eset.com/int/Kr00k/">https://www.eset.com/int/Kr00k/</a><br />
<br />
Moxa has investigated this vulnerability and has determined that none of our products are affected.<br />
<br />
Moxa&#39;s Cyber Security Response Team (CSRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa&#39;s products, an update will be provided immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxa-response-regarding-the-kr00k-vulnerability</link>    
  <pubDate>
    Mon, 06 Apr 2020 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[OnCell Central Manager Cellular Management Software Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s cellular management software OnCell Central Manager. The vulnerabilities are based on Apache Flex BlazeDS&rsquo;s, a third-party component, that is embedded on the OnCell central manager. In response to this, Moxa has developed related solutions to address the vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 768px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 301px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 394px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 301px; height: 18px;">Deserialization of Untrusted Data (CWE-502), CVE-2017-5641</td>
			<td class="border-table__td" style="width: 394px; height: 18px;">Remote code execution on third-party component: Apache Flex BlazeDS</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">2</td>
			<td style="vertical-align: top; width: 301px;">Information Exposure (CWE-200), CVE-2015-3269</td>
			<td style="vertical-align: top; width: 394px;">XML External Entity (XXE) processing on third-party component: Apache Flex BlazeDS</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/oncell-central-manager-cellular-management-software-vulnerabilities</link>    
  <pubDate>
    Mon, 16 Mar 2020 09:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MGate MB3180/MB3280/MB3480/MB3170/MB3270 Series Protocol Gateways Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s MGate MB3180/MB3280/MB3480/MB3170/MB3270 Series Protocol Gateways. In response to this, Moxa has developed a related solutions to address this vulnerability..<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Improper Authentication (CWE-287)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Allow an unauthenticated, remote attacker to bypass authentication by logging in with empty username/password and execute arbitrary actions with administrator privileges on an affected system.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mgate-mb3180-3280-3480-3170-3270-vulnerability</link>    
  <pubDate>
    Tue, 03 Mar 2020 09:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[OnCell G3100-HSPA Series and OnCell G3470A-LTE Series Cellular Gateway Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s OnCell G3100-HSPA Series and OnCell G3470A-LTE Series Cellular Gateway. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:<br />
<strong>OnCell G3470A-LTE Series:</strong></p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)<br />
			CVE-2018-11425</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Denial of service and remote code execution</td>
		</tr>
	</tbody>
</table>
</div>

<p><br />
<strong>OnCell G3100-HSPA Series:</strong></p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Uncontrolled Resource Consumption (CWE-400)<br />
			CVE-2018-11420</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Remote code execution</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)<br />
			CVE-2018-11423</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Denial of service and remote code execution</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Null Pointer Dereference (CWE-476)<br />
			CVE-2018-11424</td>
			<td style="vertical-align: top;">Denial of service</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Improper Authentication (CWE-287)<br />
			CVE-2018-11426</td>
			<td style="vertical-align: top;">Attacker can brute force authentication parameters</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">Cross-Site Request Forgery (CSRF) (CWE-352)<br />
			CVE-2018-11427</td>
			<td style="vertical-align: top;">Attacker can impersonate administrative actions via web interface</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top;">Information Exposure (CWE-200)<br />
			CVE-2018-11421</td>
			<td style="vertical-align: top;">Attacker can obtain sensitive information such as administrative credentials</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top;">Improper Access Control (CWE-284)<br />
			CVE-2018-11422</td>
			<td style="vertical-align: top;">Attacker can modify configuration and upload firmware</td>
		</tr>
	</tbody>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/oncell-g3100-hspa-oncell-g3470a-lte-cellular-gateway-vulnerabilities</link>    
  <pubDate>
    Thu, 13 Feb 2020 09:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MGate 5105-MB-EIP Series Protocol Gateways Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s MGate 5105-MB-EIP Series Protocol Gateways. In response to this, Moxa has developed related solutions to address this vulnerability..<br />
<br />
The identified vulnerability type and potential impacts are shown below:</p>

<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Command Injection (CWE-78), CVE-2020-8858, ZDI-CAN-9552</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A Command Injection vulnerability exists in the web server of the MGate 5105-MB-EIP Series that could allow a remote attacker to execute arbitrary commands.</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mgate-5105-mb-eip-series-protocol-gateways-vulnerability</link>    
  <pubDate>
    Mon, 06 Jan 2020 09:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[AWK-3121 Series Industrial AP/Bridge/Client Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s AWK-3121 Series. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Improper Neutralization of Special Elements used in a Command (&#39;Command Injection&#39;) (CWE-77)<br />
			CVE-2018-10697, CVE-2018-10699</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Multiple parameters are susceptible to command injection</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Improper Neutralization of Special Elements used in a Command (&#39;Command Injection&#39;) (CWE-77)<br />
			CVE-2018-10702</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Specified parameter is susceptible to command injection via shell metacharacters</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Improper Neutralization of Input During Web Page Generation (&#39;Cross-site Scripting&#39;) (CWE-79)<br />
			CVE-2018-10692</td>
			<td style="vertical-align: top;">Vulnerable to cross-site scripting attack to steal the cookie</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Improper Neutralization of Input During Web Page Generation (&#39;Cross-site Scripting&#39;) (CWE-79)<br />
			CVE-2018-10700</td>
			<td style="vertical-align: top;">Specified parameter is susceptible to XSS payload injection</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)<br />
			CVE-2018-10693, CVE-2018-10695, CVE-2018-10701, and CVE-2018-10703</td>
			<td style="vertical-align: top;">Multiple parameters are susceptible to buffer overflow</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top;">Credentials Management (CWE-255) CVE-2018-10690</td>
			<td style="vertical-align: top;">The device by default allows HTTP traffic thus providing an insecure communication mechanism for a user connecting to the web server</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top;">Credentials Management (CWE-255) CVE-2018-10694</td>
			<td style="vertical-align: top;">The device provides a Wi-Fi connection that is open and does not use any encryption mechanism by default</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">8</td>
			<td style="vertical-align: top;">Credentials Management (CWE-255) CVE-2018-10698</td>
			<td style="vertical-align: top;">The device enables an unencrypted TELNET service by default</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">9</td>
			<td style="vertical-align: top;">Improper Access Control (CWE-284) CVE-2018-10691</td>
			<td style="vertical-align: top;">Vulnerable to unauthorized systemlog.log download</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">10</td>
			<td style="vertical-align: top;">Cross-Site Request Forgery (CSRF) (CWE-352) CVE-2018-10696</td>
			<td style="vertical-align: top;">Web interface is not protected against CSRF attacks</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/awk-3121-series-industrial-ap-bridge-client-vulnerabilities</link>    
  <pubDate>
    Mon, 02 Dec 2019 09:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding URGENT/11 Vulnerability]]></title>
  <description>
    <![CDATA[<p>Multiple vulnerabilities have been found in VxWorks Real Time Operation System (RTOS) TCP/IP stack (IPnet) since version 6.5. These vulnerabilities are classified as remote code execution, denial of service, information leaks, or logical flaws. The detailed information can be found on this website: <a href="https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/">https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/</a><br />
<br />
Moxa has investigated and has not found any products that are affected by these vulnerabilities.<br />
<br />
Moxa&#39;s Cyber Security Response Team (CSRT) will keep monitoring the situation and if there are any updates to the status of the vulnerabilities and it would affect Moxa&#39;s products, an update will be provided immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxa-response-regarding-urgent11-vulnerability</link>    
  <pubDate>
    Tue, 26 Nov 2019 09:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDS-G508E, EDS-G512E, and EDS-G516E Series Ethernet Switches Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>One product vulnerability was identified in Moxa&rsquo;s EDS-G508E, EDS-512E, and EDS-516E Series Ethernet Switches. In response to this, Moxa has developed a related solution to address the vulnerability.<br />
<br />
The identified vulnerability type and potential impact is shown below:</p>

<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Denial of service by PROFINET DCE-RPC endpoint discovery packets (CWE-400), CVE-2019-19707</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">To exploit this vulnerability, the attacker may cause the target device to go out of service.</td>
		</tr>
	</tbody>
</table>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/eds-g508e-g512e-g516e-series-ethernet-switches-vulnerabilities</link>    
  <pubDate>
    Wed, 20 Nov 2019 09:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-810 Series Secure Routers Vulnerability]]></title>
  <description>
    <![CDATA[<p>One product vulnerability was identified in Moxa&rsquo;s EDR-810 Series Secure Routers. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability type and potential impacts is shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Improper sanitization of special elements used in Web GUI</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A specially crafted HTTP POST could possibly trigger arbitrary command injection.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-810-series-secure-routers-vulnerability-(1)</link>    
  <pubDate>
    Wed, 20 Nov 2019 09:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDS-405A Series Ethernet Switches Vulnerabilities]]></title>
  <description>
    <![CDATA[<div>Multiple product vulnerabilities were identified in Moxa&rsquo;s EDS-405A Series Ethernet Switches. In response to this, Moxa has developed related solutions to address these vulnerabilities.</div>

<div>&nbsp;</div>

<div>The identified vulnerability types and potential impacts are shown below:</div>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Denial of Service (web service) by improper HTTP GET command</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">To exploit this vulnerability, the attacker may cause the targeted device to go out of service. This can cause authorized users to be unable to access the device. The vulnerability occurs because the packet payload size was not checked.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Denial of Service (web service) by excessive length of HTTP GET command</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">To exploit this vulnerability, the attacker may cause the targeted device to go out of service. This can cause authorized users to be unable to access the device. The vulnerability occurs because the packet payload size was not checked.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/eds-405a-series-ethernet-switches-vulnerabilities</link>    
  <pubDate>
    Thu, 07 Nov 2019 09:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-810 Series Secure Routers Vulnerability]]></title>
  <description>
    <![CDATA[<p>One product vulnerability was identified in Moxa&rsquo;s EDR-810 Series Secure Routers. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Stack-based buffer overflow (CWE-121)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Multiple functions in the web server allow users to execute arbitrary codes.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-810-series-secure-routers-vulnerability</link>    
  <pubDate>
    Wed, 02 Oct 2019 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-810 Series Secure Routers Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Two product vulnerabilities were identified in Moxa&rsquo;s EDR-810 Series secure routers. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability types and potential impacts are shownbelow:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Improper Input Validation<br />
			(<span style="display: inline !important; float: none; background-color: transparent; color: rgb(51, 51, 51); font-family: sans-serif,Arial,Verdana,&quot;Trebuchet MS&quot;; font-size: 13px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;">CWE-20, </span>CVE-2019-10969)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Improper input on the web console via the Admin or ConfigAdmin account allows unauthorized commands to be performed on the router.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Improper Access Control<br />
			(<span style="display: inline !important; float: none; background-color: transparent; color: rgb(51, 51, 51); font-family: sans-serif,Arial,Verdana,&quot;Trebuchet MS&quot;; font-size: 13px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;">CWE-284, </span>CVE-2019-10963)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The log information may be retrieved by an unauthenticated attacker, which may allow sensitive information to be disclosed.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-810-series-secure-router-vulnerabilities-(1)</link>    
  <pubDate>
    Mon, 30 Sep 2019 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDS-G516E and EDS-510E Series Ethernet Switches Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s EDS-G516E and EDS-510E Series Ethernet Switches. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px; height: 848px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Stack-based buffer overflow (CWE-121), CVE-2020-7007</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">
			<ol>
				<li>The attacker may execute arbitrary codes or target the device to cause it to go out of service.</li>
				<li>The attacker may cause the target device to go out of service, or to execute arbitrary codes. The web setting page IEEE802.1x setting page is where the vulnerabilities found.</li>
			</ol>
			</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Use of a broken or risky cryptographic algorithm (CWE-327), CVE-2020-7001</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">
			<ol>
				<li>Using a weak cryptographic algorithm may allow confidential information to be disclosed.</li>
				<li>Improper implementation of the cryptographic function may allow confidential information to be disclosed.</li>
			</ol>
			</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Use of a hard-coded cryptographic key (CWE-321), CVE-2020-6979</td>
			<td style="vertical-align: top;">Using a hard-coded cryptographic key may increase the possibility that confidential data can be recovered.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Use of a hard-coded password (CWE-798), CVE-2020-6981</td>
			<td style="vertical-align: top;">A user with malicious intent may gain access to the system without proper authentication.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">Buffer Copy without Checking Size of Input (CWE-120), CVE-2020-6999</td>
			<td style="vertical-align: top;">
			<ol>
				<li>To exploit this vulnerability, the attacker may cause the target device to go out of service. Some of the parameters in the syslog setting page do not ensure that the length of the text is not too long.</li>
				<li>To exploit this vulnerability, the attacker may cause the target device to go out of service. Some of the parameters in the DHCP setting page do not ensure that the length of the text is not too long.</li>
				<li>To exploit this vulnerability, the attacker may cause the target device to go out of service. Some of the parameters in the PTP setting page do not ensure that the length of the text is not too long.</li>
			</ol>
			</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top;">User credentials are sent in clear text (CWE-319), CVE-2020-6997</td>
			<td style="vertical-align: top;">To exploit this vulnerability, the attacker may intercept the information from the clear text communication.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top;">Weak password requirements (CWE-521), CVE-2020-6991</td>
			<td style="vertical-align: top;">A user with malicious intent may try to retrieve credentials by using brute force.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/eds-g516e-510e-ethernet-switches-vulnerabilities</link>    
  <pubDate>
    Wed, 25 Sep 2019 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MB3170/MB3180/MB3270/MB3280/MB3480/MB3660 Series Protocol Gateways Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s MB3170/MB3180/MB3270/MB3280/MB3480/MB3660 Series Protocol Gateways. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Stack-based buffer overflow (CWE-121), CVE-2019-9099</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">There were two separate issues that affected the buffer overflow in the built-in web server that allowed remote attackers to initiate a DoS attack and execute arbitrary code.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Integer overflow leads to a buffer overflow (CWE-680), CVE-2019-9098</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Integer overflow causes unexpected memory allocation that can lead to a buffer overflow.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Bypass the CSRF protection mechanism by using a token (CWE-352), CVE-2019-9102</td>
			<td style="vertical-align: top;">A predictable mechanism of generating tokens allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Use of a broken or risky cryptographic algorithm (CWE-327), CVE-2019-9095</td>
			<td style="vertical-align: top;">Sensitive information may be revealed by using a weak cryptographic algorithm with predictable variables.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">Information exposure (CWE-200), CVE-2019-9103</td>
			<td style="vertical-align: top;">An attacker can access sensitive information and usernames via the built-in web-service without proper authorization.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top;">User credentials are sent in cleartext (CWE-310), CVE-2019-9101</td>
			<td style="vertical-align: top;">Sensitive information is transmitted over some web applications in clear text.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top;">Weak password requirements (CWE-521), CVE-2019-9096</td>
			<td style="vertical-align: top;">Weak password requirements may allow an attacker to gain access by using brute force.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">8</td>
			<td style="vertical-align: top;">Cleartext storage of sensitive information (CWE-312), CVE-2019-9104</td>
			<td style="vertical-align: top;">Sensitive information is stored in configuration files using clear text, which allows attackers to use an administrative account.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">9</td>
			<td style="vertical-align: top;">Denial-of-service attack (CWE-400, CWE-941), CVE-2019-9097</td>
			<td style="vertical-align: top;">The web service will become temporarily unavailable due to the fact that the attacker overloads the system and causes the service to crash.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities</link>    
  <pubDate>
    Wed, 25 Sep 2019 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[ioLogik 2542-HSPA Series Controllers and I/Os, and IOxpress Configuration Utility Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s ioLogik 2542-HSPA Series Controllers and I/Os, and IOxpress Configuration Utility. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Use Weak Cryptographic Algorithms (CWE-310), CVE-2018-18238</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The configuration file was not encrypted. If an attacker got hold of the file, sensitive information in the device could be disclosed.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Cleartext Storage and Transmission of Sensitive Information (CWE-312 and CWE-319), CVE-2020-7003</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The configuration file was not encrypted. If an attacker got hold of the file, sensitive information in the device could be disclosed.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Denial-of-service attack (CWE-400, CWE-941), CVE-2019-18242</td>
			<td style="vertical-align: top;">Frequent and multiple requests for short-term use may cause the web server to fail.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/iologik-2542-hspa-series-ioxpress-vulnerabilities</link>    
  <pubDate>
    Wed, 25 Sep 2019 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[PT-7528 and PT-7828 Series Ethernet Switches Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s PT-7528 and PT-7828 Series Ethernet Switches. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="height: 336px; width: 723px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 340px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313px; height: 18px;">Stack-based buffer overflow (CWE-121), CVE-2020-6989</td>
			<td class="border-table__td" style="width: 340px; height: 18px;">The attacker may execute arbitrary codes or target the device to cause it to go out of service.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313px; height: 18px;">Use of a broken or risky cryptographic algorithm (CWE-327), CVE-2020-6987 / CNVD-2020-13511</td>
			<td class="border-table__td" style="width: 340px; height: 18px;">Using a weak cryptographic algorithm may allow confidential information to be disclosed.</td>
		</tr>
		<tr>
			<td style="vertical-align: top; height: 48px;">3</td>
			<td style="vertical-align: top; height: 48px; width: 313px;">Use of a broken or risky cryptographic algorithm (CWE-327), CVE-2020-6987 / CNVD-2020-13511</td>
			<td style="vertical-align: top; height: 48px; width: 340px;">Improper implementation of the cryptographic function may allow confidential information to be disclosed.</td>
		</tr>
		<tr>
			<td style="vertical-align: top; height: 33px;">4</td>
			<td style="vertical-align: top; height: 33px; width: 313px;">Use of a hard-coded cryptographic key (CWE-321), CVE-2020-6983 / CNVD-2020-13512</td>
			<td style="vertical-align: top; height: 33px; width: 340px;">Using a hard-coded cryptographic key increases the possibility that confidential data can be recovered.</td>
		</tr>
		<tr>
			<td style="vertical-align: top; height: 24px;">5</td>
			<td style="vertical-align: top; height: 24px; width: 313px;">Use of a hard-coded password (CWE-798), CVE-2020-6985 / CNVD-2020-13513</td>
			<td style="vertical-align: top; height: 24px; width: 340px;">A user with malicious intent may gain access to the system without proper authentication.</td>
		</tr>
		<tr>
			<td style="vertical-align: top; height: 30px;">6</td>
			<td style="vertical-align: top; height: 30px; width: 313px;">Weak password requirements (CWE-521), CVE-2020-6995 / CNVD-2020-13514</td>
			<td style="vertical-align: top; height: 30px; width: 340px;">A user with malicious intent may try to retrieve credentials by using brute force.</td>
		</tr>
		<tr>
			<td style="vertical-align: top; height: 40px;">7</td>
			<td style="vertical-align: top; height: 40px; width: 313px;">Information exposure (CWE-200), CVE-2020-6993 / CNVD-2020-13507</td>
			<td style="vertical-align: top; height: 40px; width: 340px;">A user with malicious intent could steal sensitive information by performing a zero-day attack.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/pt-7528-7828-ethernet-switches-vulnerabilities</link>    
  <pubDate>
    Wed, 25 Sep 2019 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort 5600 Series Serial Device Servers Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Two product vulnerabilities were identified in Moxa&rsquo;s NPort 5600 Series Serial Device Servers. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Authentication Bypass</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker can bypass authentication and gain access to device functions.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Insufficient Validation</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker can upload unauthorized firmware after gaining access to a device.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-5600-series-serial-device-servers-vulnerabilities</link>    
  <pubDate>
    Mon, 12 Aug 2019 18:30:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort IA5450A Series Serial Device Servers Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s NPort IA5450A Series Serial Device Servers. In response to this, Moxa has developed a solution to address the vulnerability<br />
<br />
The identified vulnerability type and potential impact is shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Information Leak / Disclosure</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker may be able to exploit a flaw in the handling of Ethernet frame padding that may allow information to be exposed.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5450a-series-serial-device-servers-vulnerability</link>    
  <pubDate>
    Mon, 12 Aug 2019 18:30:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDS-405A Series, EDS-408A Series, EDS-510A Series, and IKS-G6824A Series Ethernet Switches Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s EDS-405A Series, EDS-408A Series, EDS-510A Series, and IKS-G6824A Series Ethernet Switches. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<p>EDS-405A Series, EDS-408A Series, and EDS-510A Series</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Plain text storage of a password</p>

			<p>(CVE-2019-6518)</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Moxa EDS industrial switches store plaintext passwords, which would be exposed by read raw configuration function of proprietary protocol.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Predictable session ID</p>

			<p>(CVE-2019-6563)</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Moxa EDS industrial switches web server cookie value is not generated with proper encryption. Therefore, an attacker can still reuse it to recover the administrator&#39;s password.<br />
			Note: EDS-510A users do not need to upgrade the patched firmware; please visit the Solutions section for the mitigation.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">3</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Missing encryption of sensitive data</p>

			<p>(CVE-2019-6526)</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The proprietary management protocols that are used by Moxa EDS industrial switches may be exploited to reveal an administrative password.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">4</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Improper restriction of excessive authentication attempts</p>

			<p>(CVE-2019-6524)</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Moxa EDS industrial switches do not implement sufficient measures to prevent multiple failed authentication attempts, which makes the switches susceptible to brute force attacks.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">5</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Resource exhaustion</p>

			<p>(CVE-2019-6559)</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">
			<p>Moxa EDS industrial switches use proprietary protocols, which allow authenticated users with remote access to cause a denial of service via a specially crafted packet.</p>
			</td>
		</tr>
	</tbody>
</table>
</div>

<p>&nbsp;</p>

<p>IKS-G6824A Series</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Buffer overflow in account setting parameters</p>

			<p>(CVE-2019-6557)</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Improper calculation of length of cookie value leads to stack overflow, which gives an attacker an ability to cause device reboot or perform code execution.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Buffer overflow in multiple parameters</p>

			<p>(CVE-2019-6557)</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Several buffer overflow vulnerabilities can be caused by copying the unregulated contents of specific parameters, which in turn may allow remote code execution or cause device reboot.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">3</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Read device memory</p>

			<p>(CVE-2019-6522)</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Failure to properly check array bounds gives attackers the ability to read device memory on arbitrary addresses.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">4</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Failure to handle corrupted OSPF packets</p>

			<p>(CVE-2019-6559)</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Sending malformed OSPF Hello packets to a vulnerable device results in the device rebooting after 2 or 3 minutes.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">5</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Multiple XSS</p>

			<p>(CVE-2019-6565)</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">
			<p>Failure to properly validate user input gives unauthenticated and authenticated attackers the ability to perform XSS attacks on users.</p>
			</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">6</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Improper web interface access control</p>

			<p>(CVE-2019-6520)</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">
			<p>The switch has a management web interface. However, the authority is not properly checked from the server side, which results in read-only users being able to alter configurations.</p>
			</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">7</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Cross-Site Request Forgery</p>

			<p>(CVE-2019-6561)</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Cross-Site Request Forgery (CSRF) occurs when an attacker uses a web browser that has already been authenticated by a user to target a web application.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/eds-405a-series-eds-408a-series-eds-510a-series-and-iks-g6824a-series-ethernet-switches-vulnerabilities</link>    
  <pubDate>
    Fri, 01 Feb 2019 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort W2150A/NPort W2250A Serial Device Servers Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in NPort W2150A and NPort W2250A Serial Device Servers. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Authenticated OS Command Injection (CVE-2018-19659)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Web server ping function can allow users with administrative privileges to circumvent the Linux operating system&#39;s user access controls.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Authenticated OS Command Injection (CVE-2018-19660)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Web server WLAN profile properties function can allow users with administrative privileges to circumvent the Linux operating system&#39;s user access controls.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-w2150a-nport-w2250a-serial-device-servers-vulnerabilities</link>    
  <pubDate>
    Thu, 13 Dec 2018 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the Libssh Authentication Bypass Vulnerability]]></title>
  <description>
    <![CDATA[<p>A vulnerability has been found in libssh&rsquo;s server-side state machine in versions 0.7.6 and 0.8.4 and prior. This vulnerability (CVE-2018-10933) is due to improper authentication operation and it allows a remote attacker to bypass authentication on the target system.</p>

<p>Moxa has investigated and has not found any products that are affected by these vulnerabilities.</p>

<p>Moxa&#39;s Cyber Security Response Team (CSRT) will keep monitoring the situation and if there are any updates to the status of the vulnerabilities and it would affect Moxa&#39;s products, an update will be provided immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-libssh-authentication-bypass-vulnerability</link>    
  <pubDate>
    Tue, 27 Nov 2018 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[ThingsPro 2 Series System Software Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s ThingsPro 2 Series System Software. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">User enumeration</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A remote attacker can find valid users in web applications and use brute force to exploit this vulnerability to find the corresponding password.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">User privilege escalation</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The exploitation of this vulnerability allows the remote attacker to gain more privileges.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">3</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Broken access control</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The exploitation of this vulnerability allows the remote attacker to gain more privileges.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">4</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">The server does not require the old password when changing the password</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">It is too easy for a remote attacker to change the password.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">5</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Cleartext storage of sensitive information</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The remote attacker can guess the token permissions.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">6</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Privilege escalation exists on hidden token</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The remote attacker could gain root privileges and execute commands by accessing the hidden token API.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">7</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Remote code execution</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The remote attacker can use this to inject strings and force the server to run additional commands.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/thingspro-2-series-system-software-vulnerabilities</link>    
  <pubDate>
    Wed, 17 Oct 2018 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-810 Series Secure Router Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s EDR-810 Series Secure Router. In response to this, Moxa has developed related solutions to address this vulnerability.</p>

<p>The identified vulnerability type and potential impact are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td>A command injection vulnerability in the web server function</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The application allows remote attackers to execute arbitrary OS commands with root privilege via the CA name parameter to the /xml/net_WebCADELETEGetValue URI.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-810-series-secure-router-vulnerability</link>    
  <pubDate>
    Fri, 21 Sep 2018 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the Intel Management Engine Vulnerability]]></title>
  <description>
    <![CDATA[<p>In May 2017, researchers announced a vulnerability whereby an attacker who should not have access to a network could gain system privileges to provision Intel manageability SKUs and a local attacker could then provision manageability features to gain network or local system privileges on Intel manageability SKUs.</p>

<ul>
	<li>CVE-2017-5689</li>
</ul>

<p>In the second half of 2017, researchers identified multiple vulnerabilities that are related to the Intel Management Engine.</p>

<ul class="bullet-list">
	<li>CVE-2017-5705</li>
</ul>

<ul class="bullet-list">
	<li>CVE-2017-5708</li>
</ul>

<ul class="bullet-list">
	<li>CVE-2017-5711</li>
</ul>

<ul class="bullet-list">
	<li>CVE-2017-5712</li>
</ul>

<p>In response to these vulnerabilities, Intel released a patch management engine firmware for all its platforms. Moxa has identified which of our products have been affected and issued a firmware upgrade. Any products that are not listed will not be affected by the aforementioned vulnerabilities. We recommend that people who have purchased the affected products get assistance through Moxa Global Customer Service and update to the latest BIOS.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-intel-management-engine-vulnerability</link>    
  <pubDate>
    Thu, 09 Aug 2018 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort 5200 Series Serial Device Server Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s NPort 5200 Series Serial Device Server. In response to this, Moxa has developed related solution to address this vulnerability.</p>

<p>The identified vulnerability type and potential impact are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Uncontrolled Resource Consumption</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The amount of resources requested by a malicious actor are not restricted, allowing for a denial-of-service condition</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-5200-series-serial-device-server-vulnerability</link>    
  <pubDate>
    Tue, 07 Aug 2018 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDS-G508E Series, EDS-G512E Series, and EDS-G516E Series Ethernet Switch Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s EDS-G508E Series, EDS-G512E Series, and EDS-G516E Series Ethernet Switch. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Denial of Service</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker could remotely manipulate the session ID and disrupt the network communications of Moxa&#39;s switch.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Cookie Management</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Cookies are not secured against being reused</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">3</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Cross-Site Scripting Attack</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker could use these flaws to insert a malicious code on to the users&#39; browser or on to the switch.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/eds-g508e-series-eds-g512e-series-and-eds-g516e-series-ethernet-switch-vulnerabilities</link>    
  <pubDate>
    Thu, 31 May 2018 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[EDR-810 Series Secure Router Vulnerabilities ]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s EDR-810 Series Secure Router. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Web Server Ping Command Injection (TALOS-2017-0472)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A specially crafted HTTP POST can cause a privilege escalation resulting in a root shell. An attacker can inject OS commands to trigger this vulnerability</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Web RSA Key Generation Command Injection (TALOS-2017-0473)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A specially crafted HTTP POST can cause a privilege escalation resulting in a root shell. An attacker can inject OS commands to trigger this vulnerability.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">3</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Web Server strcmp Multiple Denial of Service (TALOS-2017-0474)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a specified request to trigger this vulnerability.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">4</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Clear Text Transmission of Password (TALOS-2017-0475)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker can look at network traffic to get the admin password for the device. The attacker can then use the credentials to log in as admin.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">5</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Web Server URI Denial of Service (TALOS-2017-0476)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker can send a crafted URI to trigger this vulnerability.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">6</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Web Server Certificate Signing Request Command Injection (TALOS-2017-0477)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A specially crafted HTTP POST can cause a privilege escalation resulting in a root shell. An attacker can inject OS commands to trigger this vulnerability.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">7</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Web Server Cross-Site Request Forgery (TALOS-2017-0478)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A specially crafted HTTP packet can cause a cross-site request forgery. An attacker can create malicious HTML to trigger this vulnerability.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">8</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Plaintext Password Storage (TALOS-2017-0479)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker with shell access could extract passwords in clear text from the device.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">9</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Server Agent Information Disclosure (TALOS-2017-0480)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A specially crafted TCP packet can cause information disclosure. An attacker can send a crafted TCP packet to trigger this vulnerability.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">10</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Web Server Weak Cryptography for Passwords (TALOS-2017-0481)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker could intercept weakly encrypted passwords and could use brute force to break them.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">11</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Web Server OpenVPN Config Multiple Command Injection (TALOS-2017-0482)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A specially crafted HTTP POST can cause a privilege escalation resulting in a root shell. An attacker can inject OS commands to trigger this vulnerability.</td>
		</tr>
		<tr>
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">12</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Service Agent Multiple Denial of Service (TALOS-2017-0487)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A specially crafted packet can cause a denial of service.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/edr-810-series-secure-router-vulnerabilities</link>    
  <pubDate>
    Tue, 22 May 2018 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[AWK-3131A Series Wireless AP/Bridge/Client Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s AWK-3131A Series Wireless AP/bridge/client. In response to this, Moxa has developed related solution to address these vulnerability.</p>

<p>The identified vulnerability type and potential impact are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Improper Neutralization of Special Elements used in an OS Command (&#39;OS Command Injection&#39;)</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Attackers could perform unauthorized commands, which could then be used to disable the software, or read and modify data for which the attacker should not have permission to access.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/awk-3131a-series-wireless-ap-bridge-client-vulnerability</link>    
  <pubDate>
    Mon, 16 Apr 2018 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[OnCell G3100-HSPA Series Cellular Gateway/Router Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s OnCell G3100-HSPA Series Cellular Gateway/Router. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Reliance on cookies without validation and integrity checking</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The application allows a cookie parameter to consist of only digits, allowing an attacker to perform a brute force attack bypassing authentication and gaining access to device functions.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Improper handling of length parameter inconsistency</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker may be able to edit the element of an HTTP request, causing the device to become unavailable.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">3</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Null pointer dereference</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The application does not check for a NULL value, allowing for an attacker to perform a denial of service attack.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/oncell-g3100-hspa-series-cellular-gateway-router-vulnerabilities</link>    
  <pubDate>
    Tue, 13 Mar 2018 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MXview Series Network Management Software Vulnerability]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s MXview Series Network Management Software. In response to this, Moxa has developed related solution to address this vulnerability.</p>

<p>The identified vulnerability type and potential impact are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">
			<p>Unquoted search path or element (CWE-428), CVE-2017-14030</p>
			</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">The unquoted service path escalation vulnerability could allow an authorized user with file access to escalate privileges by inserting arbitrary code into the unquoted service path.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mxview-series-network-management-software-vulnerability</link>    
  <pubDate>
    Tue, 13 Mar 2018 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the CPU Hardware Vulnerability to Side-Channel Attacks (Meltdown & Spectre)]]></title>
  <description>
    <![CDATA[<p>In January 2018, researchers announced vulnerabilities that can corrupt the implementation of speculative execution of instructions on microprocessor architectures to perform side-channel information disclosure attacks.</p>

<p>CVE-2017-5753 (Spectre)<br />
CVE-2017-5715 (Spectre)<br />
CVE-2017-5754 (Meltdown)</p>

<p>The vulnerabilities could allow an attacker to read information on the microprocessors or memory allocated on the operating system kernel.</p>

<p>To take advantage of these vulnerabilities, the attacker must be able to run a malicious custom code on a device. The vast majority of Moxa&#39;s products are not vulnerable since they operate on closed systems that do not allow custom codes to be run on the devices.</p>

<p>Moxa&#39;s devices that use a computer platform which includes microprocessors that could be targeted may be considered vulnerable even if they are not directly affected by the vulnerabilities. Vendors of microprocessors and operating systems are releasing updates that help mitigate these vulnerabilities. Moxa will also release updates for these products based on the vendor&#39;s suggestions.</p>

<p>Moxa&#39;s Cyber Security Response Team (CSRT) is fully engaged in this matter and we are taking appropriate action. If there are any updates to the status of the vulnerabilities or how these affect Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-cpu-hardware-vulnerability-to-side-channel-attacks-meltdown-spectre</link>    
  <pubDate>
    Tue, 16 Jan 2018 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the Key Reinstallation Attacks (KRACKs) Vulnerability]]></title>
  <description>
    <![CDATA[<p>On October 2017, security vulnerabilities were disclosed in WPA2 (Wi-Fi protected Access II), which made it possible for a user to eavesdrop on Wi-Fi traffic that utilized WPA2. An attacker within the wireless range of a Wi-Fi network can exploit these vulnerabilities using key reinstallation attacks (KRACKs).</p>

<p>Moxa&#39;s Cyber Security Response Team (CSRT) is fully engaged in this matter and we are taking appropriate action. Our team has been working with all of our product teams to determine which models have been affected.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-key-reinstallation-attacks-kracks-vulnerability</link>    
  <pubDate>
    Fri, 27 Oct 2017 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa AWK-3131A Wireless AP/Bridge/Client Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s AWK-3131A Series Wireless AP/Bridge/Client. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Web application nonce reuse vulnerability (CWE-613)<br />
			TALOS-2016-0225, CVE-2016-8712</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">A session token is able to be reused for attackers to log in.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Web application cleartext transmission of password vulnerability (CWE-640)<br />
			TALOS-2016-0230, CVE-2016-8716</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Users without authorized access can intercept password transmission traffic through the web console and obtain valid credentials.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">3</td>
			<td style="vertical-align: top;">Hard-coded administrator credentials vulnerability (CWE-798)<br />
			TALOS-2016-0231, CVE-2016-8717</td>
			<td style="vertical-align: top;">An authorized administrator cannot modify or remove the backdoor account, which gives attackers the opportunity to control affected devices.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">4</td>
			<td style="vertical-align: top;">Web application cross-site request forgery vulnerability (CWE-352)<br />
			TALOS-2016-0232, CVE-2016-8718</td>
			<td style="vertical-align: top;">An authenticated admin or user is able to execute arbitrary commands through the web console.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">5</td>
			<td style="vertical-align: top;">Web application multiple reflected cross-site scripting vulnerabilities (CWE-79)<br />
			TALOS-2016-0233, CVE-2016-8719</td>
			<td style="vertical-align: top;">An authenticated admin or user is able to execute malicious script in a web browser.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">6</td>
			<td style="vertical-align: top;">Web application HTTP header injection vulnerability (CWE-74)<br />
			TALOS-2016-0234, CVE-2016-8720</td>
			<td style="vertical-align: top;">An authenticated admin or user can inject a payload into a specific parameter, which will be copied into the Location header of the HTTP response.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">7</td>
			<td style="vertical-align: top;">Web application ping command injection vulnerability (CWE-78)<br />
			TALOS-2016-0235, CVE-2016-8721</td>
			<td style="vertical-align: top;">An authenticated admin or user is able to execute arbitrary commands through the web console.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">8</td>
			<td style="vertical-align: top;">Web application information disclosure vulnerability (CWE-200)<br />
			TALOS-2016-0236, CVE-2016-8722</td>
			<td style="vertical-align: top;">An unauthorized user is able to retrieve sensitive information through a specific URL.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">9</td>
			<td style="vertical-align: top;">Web application denial of service vulnerability (CWE-476)<br />
			TALOS-2016-0237, CVE-2016-8723</td>
			<td style="vertical-align: top;">Unexpected HTTP request has the potential to crash the device&rsquo;s web server.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">10</td>
			<td style="vertical-align: top;">Sensitive information disclosure vulnerability (CWE-200)<br />
			TALOS-2016-0238, CVE-2016-8724</td>
			<td style="vertical-align: top;">Potentially sensitive information is accessible through a freely-available Windows application or by using customized scripts.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">11</td>
			<td style="vertical-align: top;">Web application information disclosure vulnerability (CWE-200)<br />
			TALOS-2016-0239, CVE-2016-8725</td>
			<td style="vertical-align: top;">An unauthorized user is able to retrieve sensitive information through a specific URL.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">12</td>
			<td style="vertical-align: top;">Web application denial of service vulnerability (CWE-476)<br />
			TALOS-2016-0240, CVE-2016-8726</td>
			<td style="vertical-align: top;">Unexpected HTTP request has the potential to crash the device&rsquo;s web server.</td>
		</tr>
		<tr>
			<td style="vertical-align: top;">13</td>
			<td style="vertical-align: top;">Web Application information disclosure vulnerability (CWE-200)<br />
			TALOS-2016-0241, CVE-2016-8727</td>
			<td style="vertical-align: top;">An unauthorized user is able to retrieve sensitive information through a specific URL.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxa-awk-3131a-wireless-ap-bridge-client-security-vulnerabilities</link>    
  <pubDate>
    Mon, 10 Apr 2017 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[OnCell G3470A-LTE Series Cellular Gateway Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s OnCell G3470A-LTE Series Cellular Gateway. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Authorization bypass</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Unauthorized users could download log files and SNMP MIB files by accessing a specific URL.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Disclosed OS command</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Authenticated admins or users are able to execute arbitrary commands by web console.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/oncell-g3470a-lte-series-cellular-gateway-vulnerabilities</link>    
  <pubDate>
    Fri, 14 Oct 2016 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[AWK Series, TAP Series, and WAC Series Wireless AP/Bridge/Client Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s AWK Series, TAP Series, and WAC Series Wireless AP/Bridge/Client. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Authorization bypass</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Unauthorized users could download log files and SNMP MIB files by accessing a specific URL.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Disclosed OS command</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Authenticated admins or users are able to execute arbitrary commands by web console.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/awk-series-tap-series-and-wac-series-wireless-ap-bridge-client-vulnerabilities</link>    
  <pubDate>
    Fri, 14 Oct 2016 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[ioLogik E1200 Series and ioLogik E2200 Series Controllers and I/O Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s ioLogik E1200 Series and ioLogik E2200 Series Controllers and I/O. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Multiple Stored Cross Site Scripting - XSS (CWE-79), CVE-2016-8359</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An authenticated user can execute arbitrary code from the web console.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Password sent via HTTP GET method (CWE-522), CVE-2016-8372</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">In the HTTP web console, the password is not encrypted during the HTTP get request.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">3</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Password truncation (CWE-521), CVE-2016-8379</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">With a brute force attack tool, it is possible to guess simple passwords. (e.g. password 12345678 or abcd1234)</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">4</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Missing CSRF Protection (CWE-352), CVE-2016-8350</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker may send requests by making a legitimate user click on a link.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/iologik-e1200-series-and-iologik-e2200-series-controllers-and-io-vulnerabilities</link>    
  <pubDate>
    Fri, 19 Aug 2016 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MiiNePort E1/E2/E3 Series Serial Device Server Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s E1/E2/E3 Series Serial Device Server. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Clear text storage of sensitive information</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Disclosure of sensitive information</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Cross-site request forgery</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Unverified HTTP requests may allow atacker to trick user into making unintentional request</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">3</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Weak credential management</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Authentication bypass for administration</td>
		</tr>
	</tbody>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/miineport-e1-e2-e3-series-serial-device-server-vulnerabilities</link>    
  <pubDate>
    Fri, 01 Jul 2016 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[MGate MB3000 Series, MGate 5100 Series, and MGate W5000 Series Protocol Gateway Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>A product vulnerability was identified in Moxa&rsquo;s MGate MB3000 Series, MGate 5100 Series, and MGate W5000 Series Protocol Gateway. In response to this, Moxa has developed related solutions to address these vulnerabilities.<br />
<br />
The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Authorization bypass (CWE-287), CVE-2016-5804</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">An attacker could use brute force to find a static Call ID from a cookie and bypass the authentication.</td>
		</tr>
	</tbody>
</table>
</div>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/mgate-mb3000-5100-series-w5000-protocol-gateway-vulnerabilities</link>    
  <pubDate>
    Wed, 01 Jun 2016 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[NPort 5000 Series, and NPort 6000 Series Serial Device Server Vulnerabilities]]></title>
  <description>
    <![CDATA[<p>Multiple product vulnerabilities were identified in Moxa&rsquo;s NPort 5000 Series, and NPort 6000 Series Serial Device Server. In response to this, Moxa has developed related solutions to address these vulnerabilities.</p>

<p>The identified vulnerability types and potential impacts are shown below:</p>

<div class="module-block__table">
<table class="border-table" style="width: 697px;">
	<thead class="border-table__thead">
		<tr class="border-table__tr" style="height: 18px;">
			<th class="border-table__th" style="width: 50.9667px; text-align: left; height: 18px;">Item</th>
			<th class="border-table__th" style="width: 313.033px; text-align: left; height: 18px;">Vulnerability Type</th>
			<th class="border-table__th" style="width: 363px; text-align: left; height: 18px;">Impact</th>
		</tr>
	</thead>
	<tbody class="border-table__tbody">
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">1</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Unauthenticated retrievable sensitive account information</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Ensure that passwords have been enabled.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">2</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Unauthenticated remote firmware update</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Ensure that passwords have been enabled.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">3</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Buffer overflow</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Setup access control to devices to prevent any un-authorized access from those taking advantage of the vulnerability.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">4</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Cross-site scription</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Setup access control to devices to prevent any un-authorized access from those taking advantage of the vulnerability.</td>
		</tr>
		<tr class="border-table__tr" style="height: 18px;">
			<td class="border-table__td" style="width: 50.9667px; height: 18px;">5</td>
			<td class="border-table__td" style="width: 313.033px; height: 18px;">Cross-site request forgery</td>
			<td class="border-table__td" style="width: 363px; height: 18px;">Setup access control to devices to prevent any un-authorized access from those taking advantage of the vulnerability.</td>
		</tr>
	</tbody>
</table>
</div>

<p>&nbsp;</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/nport-5000-series-and-nport-6000-series-serial-device-server-vulnerabilities</link>    
  <pubDate>
    Fri, 15 Apr 2016 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding SSLv2 Vulnerabilities (DROWN, CVE-2016-0800)]]></title>
  <description>
    <![CDATA[<p>Moxa has verified that some of its products are impacted by the SSLv2 vulnerability, CVE-2016-0800. Also known as &ldquo;DROWN&rdquo; vulnerability, this vulnerability could allow data, including passwords and encryption keys, to be read from affected systems.<br />
<br />
Moxa&#39;s Cyber Security Response Team (CSRT) is fully engaged in this matter and we are taking appropriate action. If there are any updates to the status of the vulnerabilities or how these affect Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-sslv2-vulnerabilities-drown</link>    
  <pubDate>
    Thu, 31 Mar 2016 10:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the GNU Glibc Gethostbyname Function Buffer Overflow Vulnerability (GHOST, CVE-2015-0235)]]></title>
  <description>
    <![CDATA[<p>According to ICS-CERT, the &ldquo;<a href="https://nvd.nist.gov/vuln/detail/CVE-2015-0235">GHOST</a>&quot; vulnerability (CVE-2015-0235) in the &ldquo;glibc&rdquo; library could affect industrial systems. An authenticated local administrator could cause a denial of service of the targeted system by exploiting this vulnerability.</p>

<p>ICS-CERT recommends the three following general defensive measures to protect against this and other cybersecurity risks:</p>

<ul>
	<li>Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.</li>
	<li>Locate control system networks and remote devices behind firewalls, and isolate them from the business network.</li>
	<li>When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.</li>
</ul>

<p>Moxa&#39;s Cyber Security Response Team (CSRT) is fully engaged in this matter and we are taking appropriate action. If there are any updates to the status of the vulnerabilities or how these affect Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-gnu-glibc-gethostbyname-function-buffer-overflow-vulnerability-ghost-cve-2015-0235</link>    
  <pubDate>
    Tue, 05 May 2015 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the GNU Bourne-Again Shell (Bash) Vulnerability (Shellshock)]]></title>
  <description>
    <![CDATA[<p>Moxa has verified that some of its products are impacted by the GNU Bourne-Again Shell (Bash) vulnerability (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, and CVE 2014-6278). Also known as &ldquo;<a href="https://www.us-cert.gov/ncas/alerts/TA14-268A">Shellshock</a>,&rdquo; this vulnerability could allow an attacker to remotely execute shell commands by attaching malicious code in environment variables used by the operating system.</p>

<p>Moxa&#39;s Cyber Security Response Team (CSRT) is fully engaged in this matter and we are taking appropriate action. If there are any updates to the status of the vulnerabilities or how these affect Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-gnu-bourne-again-shell-bash-vulnerability-shellshock</link>    
  <pubDate>
    Tue, 07 Oct 2014 00:00:00 GMT
  </pubDate>
</item><item>
  <title><![CDATA[Moxa’s Response Regarding the Open SSL Vulnerability (Heartbleed, CVE-2014-0160)]]></title>
  <description>
    <![CDATA[<p>Moxa has verified that none of its products are impacted by the Open SSL vulnerability CVE-2014-0160.&nbsp; Also known as <a href="https://nvd.nist.gov/vuln/detail/cve-2014-0160">Heartbleed</a>, this vulnerability could allow data, including passwords and encryption keys, to be read from affected systems.</p>

<p>Moxa&#39;s Cyber Security Response Team (CSRT) is fully engaged in this matter and we are taking appropriate action. If there are any updates to the status of the vulnerabilities or how these affect Moxa&#39;s products, we will provide an update immediately.</p>
]]>
  </description>
  <link>https://www.moxa.com/en/support/product-support/security-advisory/moxas-response-regarding-the-open-ssl-vulnerability-heartbleed-cve-2014-0160</link>    
  <pubDate>
    Wed, 16 Apr 2014 00:00:00 GMT
  </pubDate>
</item></channel>
</rss>
