As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories


Moxa’s Response Regarding the InterNiche Stack (INFRA:HALT) Vulnerabilities

  • Security Advisory ID: MPSA-211203
  • Version: V1.0
  • Release Date: Dec 02, 2021
  • Reference:
    • CVE-2020-25767, CVE-2020-25926, CVE-2020-25927, CVE-2020-25928, CVE-2020-35683, CVE-2020-35684, CVE-2020-35685, CVE-2021-27565, CVE-2021-31226, CVE-2021-31227, CVE-2021-31228, CVE-2021-31400, CVE-2021-31401, CVE-2021-36762
    • CERT@VDE, VDE-2021-032
    • CERT Coordination Center, VU#608209
    • CISA (ICS-CERT), ICSA-21-217-01

Security researchers discovered 14 vulnerabilities in the HCC Embedded’s InterNiche stack (NicheStack) and NicheLite. As these vulnerabilities involve processing network packets, unauthenticated attackers may use specially crafted network packets to cause a Denial-of-Service (DoS) attack, disclose information, or execute arbitrary code on the target device remotely.

At the time of publication, none of these vulnerabilities affect Moxa products.

Moxa's Cyber Security Response Team (CSRT) will keep monitoring the situation and if there are any updates to the status of the vulnerability that affects Moxa's products, we will provide an update immediately.


Affected Products:

Moxa has investigated these vulnerabilities and has determined that none of our products are currently affected.


Currently, no workarounds or software updates are required for these vulnerabilities.

Revision History:

1.0 First Release Dec 02, 2021
  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!