As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories

SUMMARY

Moxa’s Response Regarding the AMNESIA:33 Vulnerability

A set of vulnerabilities has been found in multiple open source TCP/IP stacks (uIP, FNET, picoTCP, and Nut/Net) that can allow an attacker to corrupt memory, perform remote code execution, leak information, and poison DNS cache. The detailed information can be found here.

Moxa has investigated this vulnerability and has determined that none of our products are currently affected.

Moxa's Cyber Security Response Team (CSRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa's products, an update will be provided immediately.

AFFECTED PRODUCTS AND SOLUTIONS

Affected Products:

Moxa has investigated and determined that none of our products are currently affected by this vulnerability.

 

Revision History:

VERSION DESCRIPTION RELEASE DATE
1.0 First Release Dec 21, 2020
  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!
Feedback