As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories

SUMMARY

ioLogik E1200 Series Web Server Vulnerability

The ioLogik E1200 Series prior to version 3.3 is affected by web application vulnerabilities.

CVE-2023-5961

A vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. An attacker can exploit this vulnerability to trick a client into making an unintentional request to the web server, which will be treated as an authentic request.

CVE-2023-5962

A vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data.

 

The identified vulnerability types and potential impacts are shown below:

Item Vulnerability Type Impact
1
Cross-Site Request Forgery (CSRF) (CWE-352)
CVE-2023-5961
This vulnerability may lead an attacker to perform operations on behalf of the victimized user.
2
Use of a Broken or Risky Cryptographic Algorithm (CWE-327)
CVE-2023-5962
This vulnerability may lead an attacker to get unexpected authorization.

 

Vulnerability Scoring Details

ID CVSS V3.1 VECTOR REMOTE EXPLOIT WITHOUT AUTH?
CVE-2023-5961 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H  Yes
CVE-2023-5962 6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N No
AFFECTED PRODUCTS AND SOLUTIONS

Affected Products:

The affected products and firmware versions are shown below.

Product Series Affected Versions
ioLogik E1200 Series Firmware version v3.3 and prior versions

 

Solutions:

Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.

Product Series Solutions
ioLogik E1200 Series Please contact Moxa Technical Support for the security patch.

 

Mitigations:

Moxa recommends users follow CISA recommendations.

  • Reduce network exposure by ensuring that all control system devices and systems are not accessible from the Internet.
  • Place control system networks and remote devices behind firewalls, isolating them from business networks.
  • When remote access is necessary, employ secure methods such as Virtual Private Networks (VPNs). It is important to note that VPNs may have vulnerabilities and should be kept up to date with the latest available version. Remember that the security of a VPN depends on the security of its connected devices.

 

Acknowledgment:

We would like to express our appreciation to Reza Rashidi from HADESS for reporting the vulnerability, working with us to help enhance the security of our products, and helping us provide a better service to our customers.

 

Revision History:

VERSION DESCRIPTION RELEASE DATE
1.0 First Release Dec 23, 2023

Relevant Products

ioLogik E1200 Series ·

  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!
Feedback