• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Multiple SWIFT-themed Phishing campaigns – Threat Indicators
March 1, 2019
Rewterz Threat Alert – HatMan—Safety System Targeted by Malware
March 2, 2019

Rewterz Threat Advisory – Industrial Control Moxa – IKS & EDS Multiple Vulnerabilities

March 1, 2019

Severity

High

Analysis Summary


Following remotely exploitable vulnerabilities have been found in MOXA’s IKS and EDS equipment.

Vulnerabilities:

CVE-2019-6557:

Classic Buffer Overflow Several buffer overflow vulnerabilities have been identified, which may allow remote code execution.

CVE-2019-6561:

Cross-site Request Forgery A cross-site request forgery has been identified, which may allow for the execution of unauthorized actions on the device.

CVE-2019-6565:

Cross-site Scripting The device fails to properly validate user input, giving unauthenticated and authenticated attackers the ability to perform XSS attacks, which may be used to send a malicious script.

CVE-2019-6520:

Improper Access Controls The device does not properly check authority on server side, which results in a read-only user being able to perform arbitrary configuration changes.

CVE-2019-6524:

Improper Restriction of Excessive Authentication Attempts The devices do not implement sufficient measures to prevent multiple failed authentication attempts, which may allow an attacker to discover passwords via brute force attack.

CVE-2019-6526:

Missing Encryption of Sensitive Data The devices use plaintext transmission of sensitive data, which may allow an attacker to capture sensitive data such as an administrative password.

CVE-2019-6522:

Out-of-bounds Read, Failure to properly check array bounds may allow an attacker to read device memory on arbitrary addresses, which may allow an attacker to retrieve sensitive data or cause device reboot.


CVE-2019-6518:

Unprotected Storage of Credentials The devices store plaintext passwords, which may allow sensitive information to be read by someone with access to the device.

CVE-2019-6563:

Predictable from Observable State The software generates a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator’s password, which could lead to a full compromise of the device.

CVE-2019-6559:

Uncontrolled Resource Consumption The devices allow remote authenticated users to cause a denial of service via a specially crafted packet, which may cause the switch to crash.

Impact

  • Exposure of sensitive information
  • Remote Code Execution
  • Arbitrary configuration changes
  • Authentication bypass
  • Sensitive data capture
  • Reboot of the device
  • Device crash
  • Full compromise of the device

Affected Vendors

Moxa


Affected Products

  • IKS-G6824A series Versions 4.5 and prior
  • EDS-405A series Version 3.8 and prior
  • EDS-408A series Version 3.8 and prior
  • EDS-510A series Version 3.8 and prior.

Remediation


Moxa recommends that users implement the following measures to mitigate these vulnerabilities.

  • Install firmware patch. Patches may be requested from Moxa Customer Service at the following link (login required): https://www.moxa.com/support/request_support.aspx
  • Disable web console access in IKS and use another console such as SNMP/Telnet/CLI instead.
  • Set EDS series Web configuration as “https only” to reduce predictable session ID concern.
  • Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.