Moxa Warns Users of Critical Vulnerabilities in Cellular and Secure Routers

Moxa Issues Warning on Critical Vulnerabilities in Networking Devices

Taiwan-based Moxa has recently raised alarms about significant security vulnerabilities affecting its range of cellular routers, secure routers, and network security appliances. These flaws pose serious risks, including potential privilege escalation and unauthorized command execution, which could compromise system integrity and lead to data breaches.

The vulnerabilities in question, identified as CVE-2024-9138 and CVE-2024-9140, allow attackers to exploit weaknesses that could result in severe consequences for affected systems. CVE-2024-9138, classified with a CVSS score of 8.6, highlights a hard-coded credentials vulnerability that could permit an authenticated user to elevate privileges to root-level access. This is particularly concerning as it opens avenues for unauthorized modifications, data exposure, and service disruptions. Meanwhile, CVE-2024-9140, which carries a CVSS score of 9.3, involves an exploit that allows the use of special characters to bypass input restrictions, potentially enabling attackers to execute unauthorized commands.

These vulnerabilities have been documented by security researcher Lars Haulin, and they impact a variety of device series and firmware versions. Specifically, devices from the EDR-810, EDR-8010, EDR-G902, and others, running outdated firmware are particularly at risk. The listed firmware versions reveal that many devices have been vulnerable to these issues for an extended period, increasing their susceptibility to attacks.

Moxa has moved quickly to address these vulnerabilities by releasing patches for multiple product lines. Users of the EDR-810, EDR-8010, EDR-G902, and similar series are encouraged to upgrade their firmware to version 3.14 or later to mitigate these risks. However, certain series, such as the NAT-102, lack official patches, while users of the OnCell G4302-LTE4 and TN-4900 series are advised to contact Moxa Technical Support for assistance.

In terms of potential attack vectors, the vulnerabilities align with several tactics outlined in the MITRE ATT&CK Framework. Initial access and privilege escalation are particularly relevant, especially given the nature of the flaws. The possibility of unauthorized command execution underscores the need for robust security measures to prevent exploitation. Security best practices recommend ensuring that devices are not exposed to the internet, restricting SSH access to trusted IP addresses, and implementing proactive monitoring to detect and thwart potential attacks.

As the cybersecurity landscape evolves, organizations leveraging Moxa devices must remain vigilant in implementing updates and adhering to security protocols. The consequences of neglecting these vulnerabilities could be dire, impacting not only individual networks but also the broader integrity of connected systems.

Business owners are encouraged to stay informed about such threats, as the implications of these vulnerabilities extend well beyond technical concerns—potentially affecting operational continuity and customer trust.

Source link