As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories

SUMMARY

Security Enhancement: Intel® Converged Security Management Engine (CSME) Active Management Technology (AMT) Multiple Vulnerabilities (INTEL-SA-00391)

The Intel® Converged Security Management Engine (CSME) on the remote host is affected by multiple vulnerabilities in the Intel® Active Management Technology (AMT) function, including the following:

  • Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel® ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access. (CVE-2020-8752)
  • Out-of-bounds read in subsystem for Intel® AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access. (CVE-2020-8747)
  • Out-of-bounds read in subsystem for Intel® AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. (CVE-2020-8749)

(Source: Tenable Nessus)

Since this is a critical severity issue, users are strongly advised to immediately apply the solutions to mitigate associated security risks.

AFFECTED PRODUCTS AND SOLUTIONS

Solutions

Moxa has developed appropriate solutions to enhance the security. The solutions for the affected products are listed in the following table: 

Product Series Affected Versions Solutions
DA-682C Series BIOS v1.5 and earlier Please contact Moxa Technical Support for the security patch (BIOS v1.6 or later versions)
DA-820C Series BIOS v1.2 and earlier Please contact Moxa Technical Support for the security patch (BIOS v1.3 or later versions)

 

Mitigations

For users who may not be able to perform an update, we provide the following recommended mitigation measures as an alternative to mitigate the risk associated with the vulnerability.

  • Refer to the General Security Recommendations section to further strengthen your security context.

 

General Security Recommendations

To safeguard devices and networks, we recommend implementing the following recommendations to mitigate potential risks:

  1. Restrict network access.
    • Use firewalls or access control lists (ACLs) to limit communication to trusted IP addresses and networks.
    • Segregate operational networks from other networks (e.g., enterprise networks) using VLANs or physical separation.
  2. Minimize exposure.
    • Avoid exposing devices directly to the Internet.
    • Disable unused network services and ports to reduce the attack surface.
  3. Enhance device authentication and access control.
    • Implement multi-factor authentication (MFA) for accessing critical systems.
    • Use role-based access control (RBAC) to enforce the principle of least privilege.
  4. Regularly update firmware and software.
    • Keep devices updated with the latest firmware versions and security patches.
    • Establish a regular patch management schedule to address newly identified vulnerabilities.
  5. Secure remote access.
    • Use encrypted communication protocols (e.g., VPN, SSH) for remote access.
    • Restrict remote access to authorized personnel only and enforce strong authentication mechanisms.
  6. Implement anomaly detection techniques.
    • Monitor network traffic and device behavior for unusual or unauthorized activities.
    • Use tools or techniques that can identify anomalies and provide alerts for potential threats.
  7. Implement logging and monitoring.
    • Enable event logging and maintain audit trails on devices.
    • Regularly review logs for anomalies and unauthorized access attempts.
  8. Conduct regular security assessments.
    • Perform vulnerability assessments to identify potential risks.
    • Regularly review device configurations to ensure compliance with security policies.

 

Revision History:

VERSION DESCRIPTION RELEASE DATE
1.0 First release March 9, 2026

Relevant Products

DA-682C Series · DA-820C Series ·

  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!
Feedback