As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories

SUMMARY

Security Enhancements in the EDS-P510 Series - Modbus/TCP Access, Device Identification, and Unencrypted Telnet Server

  • Security Advisory ID: MPSA-241021
  • Version: V1.0
  • Release Date: Nov 08, 2024

The EDS-P510 Series has been enhanced to address several key vulnerabilities:

  1. Modbus/TCP Coil Access: Attackers could read and analyze coil settings, which may allow them to alter device functions in SCADA and DCS environments.
  2. Modbus/TCP Device Identification: Attackers could retrieve device details via Modbus MEI read requests, potentially exposing Vendor Name, Product Code, and other identifying information.
  3. Unencrypted Telnet Server: Using Telnet over an unencrypted channel can expose sensitive information, such as credentials, to interception. SSH is recommended as a secure alternative.

These updates aim to improve the EDS-P510 Series’ resilience against vulnerabilities, thereby enhancing its overall security.


Vulnerability Scoring Details 

Vulnerability
Base Score
Vector

Unauthenticated Remote Exploits

Modbus/TCP Device Identification

CVSS 3.1: 5.8

AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

Yes
Modbus/TCP Coil Access CVSS 3.1: 5.3 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Yes

Unencrypted Telnet Server

CVSS 3.1: 6.5

AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Yes
AFFECTED PRODUCTS AND SOLUTIONS

Affected Products:

The affected products and firmware versions are listed below.

Product Series Affected Versions
EDS-P510 Series Firmware version 3.11 and earlier versions

 

Solutions:

Moxa has developed appropriate solutions to address vulnerability. The solutions for the affected products are listed below.

Product Series Solutions
EDS-P510 Series Please contact Moxa Technical Support for the security patch

 

Mitigations:

Modbus/TCP Device Identification and Modbus/TCP Coil Access:

  • Restrict access to Modbus ports using firewalls, limiting access to trusted IPs.
  • Use network segmentation to isolate Modbus devices.
  • Implement access controls for authorization on Modbus write functions and monitor traffic.
  • Deploy application-layer firewalls to block unauthorized Modbus commands.

Unencrypted Telnet Server:

  • Disable Telnet and use SSH for secure remote access.
  • Restrict SSH access to trusted IP addresses.

 

Revision History:

VERSION DESCRIPTION RELEASE DATE
1.0 First release November 8, 2024

Relevant Products

EDS-P510 Series ·

  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!
Feedback