Following remotely exploitable vulnerabilities have been found in MOXA’s IKS and EDS equipment.
Classic Buﬀer Overﬂow Several buﬀer overﬂow vulnerabilities have been identiﬁed, which may allow remote code execution.
Cross-site Request Forgery A cross-site request forgery has been identiﬁed, which may allow for the execution of unauthorized actions on the device.
Cross-site Scripting The device fails to properly validate user input, giving unauthenticated and authenticated attackers the ability to perform XSS attacks, which may be used to send a malicious script.
Improper Access Controls The device does not properly check authority on server side, which results in a read-only user being able to perform arbitrary conﬁguration changes.
Improper Restriction of Excessive Authentication Attempts The devices do not implement suﬃcient measures to prevent multiple failed authentication attempts, which may allow an attacker to discover passwords via brute force attack.
Missing Encryption of Sensitive Data The devices use plaintext transmission of sensitive data, which may allow an attacker to capture sensitive data such as an administrative password.
Out-of-bounds Read, Failure to properly check array bounds may allow an attacker to read device memory on arbitrary addresses, which may allow an attacker to retrieve sensitive data or cause device reboot.
Unprotected Storage of Credentials The devices store plaintext passwords, which may allow sensitive information to be read by someone with access to the device.
Predictable from Observable State The software generates a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator’s password, which could lead to a full compromise of the device.
Uncontrolled Resource Consumption The devices allow remote authenticated users to cause a denial of service via a specially crafted packet, which may cause the switch to crash.
Moxa recommends that users implement the following measures to mitigate these vulnerabilities.