A vulnerability that can be leveraged for arbitrary code execution has been found in a tool used for integrating industrial IP surveillance solutions developed by Moxa, a Taiwan-based company that specializes in industrial networking, computing, and automation solutions.
According to ICS-CERT, independent researcher Ariele Caltabiano identified a stack-based buffer overflow vulnerability in Moxa VPort SDK Plus, a free tool that enables third party developers to create customized video management systems and integrate VPort series products with comprehensive monitoring and control systems, such as SCADA and HMI.
The flaw, which affects Moxa VPort ActiveX SDK Plus versions prior to 2.8, can be exploited by a remote attacker to execute arbitrary code with the privileges of the vulnerable VPort application.
The vulnerability impacts MxNVR-MO4 series industrial network video recorders; VPort 26A-1MP series dome cameras; VPort 351, 354, 451, 461, and 364A industrial video encoders; and VPort 36-1MP, 56-2MP, P16-1MP-M12, and P06-1MP-M12 rugged IP cameras.
“A function in ActiveX has a Stack-Based Buffer Overflow vulnerability. Successful exploitation of this vulnerability may allow insertion of lines of assembly code such as a call to another tool,” ICS-CERT wrote in its advisory.
The vulnerability, reported by Caltabiano through HP’s Zero Day Initiative (ZDI), has been assigned the CVE identifier CVE-2015-0986 and a CVSS score of 7.5 (high severity).
ICS-CERT says there is no evidence that public exploits specifically targeting this vulnerability exist. However, the organization has pointed out that even an attacker with low skill can develop an exploit.
Moxa released VPort ActiveX SDK Plus 2.8 Build 15030913 in March to address the vulnerability. The company noted in the changelog that this release fixes a “potential security issue that is caused by buffer overflow when doing regkey set or get.”
Organizations are advised by ICS-CERT to update their installations and minimize exposure of critical systems.
Related: Learn More At the ICS Cyber Security Conference

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
