Affected Products:
The affected products and firmware versions are shown below.
Product Series |
Affected Versions |
NPort IAW5000A-I/O Series |
Firmware version 2.2 and prior |
Solutions:
Moxa has developed appropriate solutions to address the vulnerability. The solutions for the affected products are shown below:
Product Series |
Solutions |
NPort IAW5000A-I/O Series |
Please contact Moxa Technical Support for the security patch. |
Mitigation:
Moxa recommends users to follow CISA’s recommendations and do the following to mitigate security vulnerabilities.
-
Reduce network exposure by ensuring that all control-system devices and systems are not accessible via the Internet.
-
Place control-system networks and remote devices behind firewalls, isolating them from business networks.
-
When remote access is necessary, employ secure methods such as Virtual Private Networks (VPNs). It is important to note that VPNs may have vulnerabilities and should be kept up to date with the latest available version. Remember that the security of a VPN depends on the security of its connected devices.
Products Confirmed Not Vulnerable:
Only products listed in the Affected Products section of this advisory are known to be affected by this vulnerability. Moxa has confirmed that this vulnerability does not affect the following products:
-
NPort 5000 (all series), NPort 6000 (all series), NPort Express Series, NPort IA5000 (all series), NPort P5150A Series, NPort S8000 Series, NPort S9000 (all series)
Revision History:
VERSION |
DESCRIPTION |
RELEASE DATE |
1.0 |
First Release |
Aug. 16, 2023 |