As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories

SUMMARY

NE-4100 Series and MiiNePort Series Affected by CVE-2016-9361

  • Security Advisory ID: MPSA-241661
  • Version: V1.0
  • Release Date: Oct 21, 2024
  • Reference:

    CVE-2016-9361 (NVD)

This security advisory addresses CVE-2016-9361 affecting the NE-4100 Series, MiiNePort E1 Series, MiiNePort E2 Series, and MiiNePort E3 Series. The vulnerability allows an attacker to retrieve administration passwords without proper authentication. This flaw potentially compromises the security of the affected devices by enabling unauthorized access to administrative controls, allowing malicious actors to alter configurations or disrupt operations.

The Identified Vulnerability Type and Potential Impact

Item Vulnerability Type Impact
1

Improper Authentication (CWE-287)

CVE-2016-9361

The administration passwords can be retried without authenticating

Vulnerability Scoring Details 

ID
CVSS v3.0 
Vector
Severity

Unauthenticated

Remote Exploit

CVE-2016-9361

9.8

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Critical Yes
AFFECTED PRODUCTS AND SOLUTIONS

Affected Products

The affected products and firmware versions are listed below.

Product Series Affected Versions
NE-4100 Series Firmware version 4.2 and earlier versions
MiiNePort E1 Series Firmware version 1.9 and earlier versions
MiiNePort E2 Series Firmware version 1.5 and earlier versions
MiiNePort E3 Series Firmware version 1.2 and earlier versions

 

Solutions

Moxa has developed appropriate solutions to address vulnerability. The solutions for the affected products are listed below.

Product Series Solutions
NE-4100 Series Please contact Moxa Technical Support for the security patch
MiiNePort E1 Series Please contact Moxa Technical Support for the security patch
MiiNePort E2 Series Please contact Moxa Technical Support for the security patch
MiiNePort E3 Series Please contact Moxa Technical Support for the security patch

 

Mitigation

  • Minimize network exposure to ensure the device is not accessible from the Internet.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs).
  • Implement IDS or Intrusion Prevention System (IPS) to detect and prevent exploitation attempts. These systems can provide an additional layer of defense by monitoring network traffic for signs of attacks.

 

Revision History

VERSION DESCRIPTION RELEASE DATE
1.0 First Release October 21, 2024

Relevant Products

MiiNePort E1 Series · MiiNePort E2 Series · MiiNePort E3 Series · NE-4100 Series ·

  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!
Feedback