As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories

SUMMARY

NPort 6000 Series Incorrect Implementation of Authentication Algorithm Vulnerability

A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service. 


The identified vulnerability types and potential impacts are shown below:

Item Vulnerability Type Impact
1
Incorrect Implementation of Authentication Algorithm (CWE-303) 
Storing Passwords in a Recoverable Format (CWE-257) 
Use of a Broken or Risky Cryptographic Algorithm (CWE-327) 
 
CVE-2023-5627 
 
An attacker can get privileged access to the web service. 

 

Vulnerability Scoring Details

ID CVSS V3.1 VECTOR REMOTE EXPLOIT WITHOUT AUTH?
CVE-2023-5627 7.5  AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N  Yes

 

AFFECTED PRODUCTS AND SOLUTIONS

Affected Products:

The affected products and firmware versions are shown below.

Product Series Affected Versions
NPort 6000 Series 
Firmware version v1.21 and prior versions  

 

Solutions:

Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.

Product Series Solutions
NPort 6000 Series  Please upgrade to firmware v2.0 or later. 

 

Mitigation

For the users still using version v1.x, refer to the Hardening Guide on Moxa’s website to: 
 
  • Upgrade to the newest firmware version. 
  • Disable the HTTP console. 
 
Moxa recommends users follow CISA recommendations.  
 
  • Reduce network exposure by ensuring that all control system devices and systems are not accessible from the Internet. 
  • Place control system networks and remote devices behind firewalls, isolating them from business networks. 
  • When remote access is necessary, employ secure methods such as Virtual Private Networks (VPNs). It is important to note that VPNs may have vulnerabilities and should be kept up to date with the latest available version. Remember that the security of a VPN depends on the security of its connected devices. 
 
 

Acknowledgment:

We would like to express our appreciation to Pasha Kravtsov and Nathan Nye from True Anomaly (trueanomaly.space) for reporting the vulnerability, working with us to help enhance the security of our products, and helping us provide a better service to our customers. 

 

Revision History:

VERSION DESCRIPTION RELEASE DATE
1.0 First Release Nov. 1, 2023

Relevant Products

NPort 6100/6200 Series · NPort 6400/6600 Series ·

  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!
Feedback