Description
This vulnerability could lead to denial-of-service or service crashes. Exploitation of the moxa_cmd service, because of insufficient input validation, allows attackers to disrupt operations. If exposed to public networks, the vulnerability poses a significant remote threat, potentially allowing attackers to shut down affected systems.
L i m i t e d I m p a c t : I n s o m e c a s e s , t h e v u l n e r a b i l i t y m a y o n l y c a u s e t h e n e t w o r k s e r v e r s e r v i c e ( H T T P S o n p o r t 4 4 3 ) t o r e s t a r t . T h i s d o e s n o t d i s r u p t t h e d e v i c e ’ s c o r e f u n c t i o n s , a n d a f t e r a n a u t o m a t i c r e s t a r t , t h e s e r v i c e r e s u m e s n o r m a l o p e r a t i o n .
L i m i t e d I m p a c t : I n s o m e c a s e s , t h e v u l n e r a b i l i t y m a y o n l y c a u s e t h e n e t w o r k s e r v e r s e r v i c e ( H T T P S o n p o r t 4 4 3 ) t o r e s t a r t . T h i s d o e s n o t d i s r u p t t h e d e v i c e ’ s c o r e f u n c t i o n s , a n d a f t e r a n a u t o m a t i c r e s t a r t , t h e s e r v i c e r e s u m e s n o r m a l o p e r a t i o n .
H i g h e r I m p a c t : I n m o r e s e v e r e e x p l o i t a t i o n s c e n a r i o s , a t t a c k e r s c a n l e v e r a g e t h e M o x a s e r v i c e ( m o x a _ c m d ) , o r i g i n a l l y i n t e n d e d f o r d e p l o y m e n t p u r p o s e s . D u e t o i n s u f f i c i e n t i n p u t v a l i d a t i o n , t h i s c a n l e a d t o a c o l d s t a r t o r a d e n i a l - o f - s e r v i c e ( D o S ) c o n d i t i o n , r e s u l t i n g i n a f u l l d e v i c e r e b o o t a n d p o t e n t i a l s e r v i c e d i s r u p t i o n s .
H i g h e r I m p a c t : I n m o r e s e v e r e e x p l o i t a t i o n s c e n a r i o s , a t t a c k e r s c a n l e v e r a g e t h e M o x a s e r v i c e ( m o x a _ c m d ) , o r i g i n a l l y i n t e n d e d f o r d e p l o y m e n t p u r p o s e s . D u e t o i n s u f f i c i e n t i n p u t v a l i d a t i o n , t h i s c a n l e a d t o a c o l d s t a r t o r a d e n i a l - o f - s e r v i c e ( D o S ) c o n d i t i o n , r e s u l t i n g i n a f u l l d e v i c e r e b o o t a n d p o t e n t i a l s e r v i c e d i s r u p t i o n s .
Problem types
CWE-1287: Improper Validation of Specified Type of Input
Product status
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
1.0 (custom)
Credits
YU-HSIANG HUANG (huang.yuhsiang.phone@gmail.com) from Moxa's cybersecurity testing team
References
www.moxa.com/...rability-identified-in-the-vport-07-3-series
www.moxa.com/...-in-multiple-eds,-ics,-iks,-and-sds-switches
www.moxa.com/...erability-identified-in-multiple-pt-switches