As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories

SUMMARY

ioLogik E2200 Series Controllers and I/Os, and ioAdmin Configuration Utility Vulnerabilities

  • Security Advisory ID: MPSA-211101
  • Version: V1.0
  • Release Date: Nov 23, 2021
  • Reference:
    • BDU:2021-05548, BDU:2021-05549, BDU:2021-05550, BDU:2021-05551, BDU:2021-05552, BDU:2021-05553, BDU:2021-05554, BDU:2021-05555, BDU:2021-05556, BDU:2021-05557, BDU:2021-05558

Multiple product vulnerabilities were identified in Moxa’s ioLogik E2200 Series Controllers and I/Os, and ioAdmin Configuration Utility. In response to this, Moxa has developed related solutions to address these vulnerabilities.

The identified vulnerability types for the ioLogik E2200 Series and potential impacts are shown below:

Item Vulnerability Type Impact
1 Improper Authentication (CWE-285) and Use of Client-side Authentication (CWE-603)
BDU:2021-05548
An attacker can form a special network package to obtain authorization information or even bypass the authentication check.
2 Use of Hard-coded Password (CWE-259)
BDU:2021-05549
Malicious users can gain access through the hard-coded password.
3 Improper Access Control (CWE-284)
BDU:2021-05550
Does not restrict or incorrectly restricts unauthorized access.
4 Stack-based Buffer Overflow (CWE-121)
BDU:2021-05551
A buffer overflow in the built-in web server allows remote attackers to initiate a DoS attack and execute arbitrary code (RCE).
5 Buffer Copy Without Checking Size of Input (CWE-120)
BDU:2021-05552
A buffer overflow in the built-in web server allows remote attackers to initiate a DoS attack.
6 Stack-based Buffer Overflow (CWE-121) and potential Improper Authorization (CWE-285)
BDU:2021-05553
A buffer overflow in the built-in web server allows remote attackers to initiate a DoS attack and execute arbitrary code (RCE), or potentially bypass authorization.
7 Stack-based Buffer Overflow (CWE-121) and potential Improper Authorization (CWE-285)
BDU:2021-05554
A buffer overflow in the built-in web server allows remote attackers to initiate a DoS attack and execute arbitrary code (RCE), or potentially bypass authorization.
8 Stack-based Buffer Overflow (CWE-121) and potential Improper Authorization (CWE-285)
BDU:2021-05555
A buffer overflow in the built-in web server allows remote attackers to initiate a DoS attack and execute arbitrary code (RCE), or potentially bypass authorization.


The identified vulnerability types for ioAdmin Configuration Utility and potential impacts are shown below:

Item Vulnerability Type Impact
9 Weak Password Requirements (CWE-521)
BDU:2021-05556
Weak password requirements may allow an attacker to use brute force to gain access to the device.
10 Improper Restriction of Excessive Authentication Attempts (CWE-307)
BDU:2021-05557
Weak password requirements may allow an attacker to use brute force to gain access to the device.
11 Cleartext Storage of Sensitive Information in Memory (CWE-316)
BDU:2021-05558
An attacker can use malware to obtain sensitive data stored in the device’s memory.
 
AFFECTED PRODUCTS AND SOLUTIONS

Affected Products:

The affected products and firmware versions are shown below.

Product Series Affected Versions
ioLogik E2200 Series Firmware Version 3.13 or lower.
ioAdmin Configuration Utility Software Version 3.19 or lower.

 

Solutions:

Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.

Product Series Solutions
ioLogik E2200 Series Items 1, 2 and 4 to 9: Please contact Moxa Technical Support for a security patch.

Item 3: To exploit this vulnerability requires physical access to the device and then to disassemble the case. Therefore, we strongly recommend that the device is installed in a locked cabinet or another secure environment.
ioAdmin Configuration Utility Items 10 and 11: Please contact Moxa Technical Support for a security patch.

 

Acknowledgment:

We would like to express our appreciation to Ilya Karpov, Konstantin Kondratev and Evgeniy Druzhinin of Rostelecom-Solar for reporting the vulnerabilities, working with us to help enhance the security of our products, and helping us provide a better service to our customers.
 

Revision History:

VERSION DESCRIPTION RELEASE DATE
1.0 First Release Nov 23, 2021

Relevant Products

ioLogik E2200 Series ·

  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!
Feedback