Connect with us

Hi, what are you looking for?



Moxa Patches Flaws in Industrial Ethernet Switches

Researchers have uncovered several serious vulnerabilities in industrial ethernet switches developed by Moxa, a Taiwan-based provider of industrial networking, computing and automation solutions.

Researchers have uncovered several serious vulnerabilities in industrial ethernet switches developed by Moxa, a Taiwan-based provider of industrial networking, computing and automation solutions.

An advisory published this week by Netherlands-based industrial cybersecurity services provider Applied Risk reveals that Moxa EDS-405A/EDS-408A series managed ethernet switches, which are widely used in industrial facilities across different critical sectors, are plagued by three types of vulnerabilities.

“An authenticated remote attacker could compromise the availability, integrity and confidentiality of a Moxa industrial managed switch, including connected industrial assets,” Applied Risk wrote in its advisory.

2014 ICS Cyber Security Conference
Register for the 2015 ICS Cyber Security Conference!

The most serious of the weaknesses identified by experts, with a CVSS score of 8.5, is a privilege escalation vulnerability affecting the device’s administrative web interface. According to researchers, an attacker can bypass the protection mechanism designed to ensure that by default user-level accounts only have read-only access to the web interface. A malicious actor could exploit the flaw to elevate privileges in the web interface.

Another vulnerability, with a CVSS score of 6.8, is a denial-of-service (DoS) issue that allows an authenticated attacker to cause a device to reboot via a specially crafted URL. The security hole exists in the embedded GoAhead web server running on affected Moxa switches.

The last vulnerability identified by Applied Risk is a cross-site scripting (XSS) bug in the administrative web interface. An attacker can exploit the flaw to inject arbitrary JavaScript code into an input field found in the admin interface.

The vulnerabilities have been tested on a Moxa EDS-405A switch running version 3.4 of the firmware. Moxa addressed the security bugs on August 26 with the release of version 3.6 for EDS-405A series switches, and version 3.5 for EDS-408A series switches.

Applied Risk disclosed the vulnerabilities directly to the vendor earlier this year. The security firm told SecurityWeek that it’s currently in contact with ICS-CERT to get CVE identifiers assigned to the flaws.

The existence of security holes in industrial ethernet switches can have serious consequences. At the recent Black Hat conference, researchers disclosed a series of vulnerabilities in such devices manufactured by Siemens, GE, Garrettcom and Opengear.

Advertisement. Scroll to continue reading.

“Compromising any switch allows the creation of malicious firmwares for further MITM manipulation of a live process. Such MITM manipulation can lead to the plant or process shutting down (think: nuclear reactor SCRAM) or getting into a unknown and hazardous state (think: damaging a blast furnace at a steel mill),” the researchers explained.

In addition to the patches for industrial switch vulnerabilities, Moxa released an update to address a total of nine heap-based buffer overflow (CVE-2015-6457) and classic buffer overflow (CVE-2015-6458) weaknesses in SoftCMS, a central management software designed for large-scale CCTV installations.

The bugs, discovered by Carsten Eiram of Risk Based Security and Fritz Sands, can be exploited to crash the software and possibly even for remote code execution. The issues impact version 1.3 and prior of SoftCMS, and they have been fixed with the release of version 1.4 on June 1.

Related: Learn More at the ICS Cyber Security Conference

Related: Moxa Industrial Surveillance Products Affected by RCE Vulnerability

Related: Alerts Issued for Zero-Day Flaws in SCADA Systems

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...


A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.