Security Experts:

Connect with us

Hi, what are you looking for?



Moxa Patches Flaws in Industrial Ethernet Switches

Researchers have uncovered several serious vulnerabilities in industrial ethernet switches developed by Moxa, a Taiwan-based provider of industrial networking, computing and automation solutions.

Researchers have uncovered several serious vulnerabilities in industrial ethernet switches developed by Moxa, a Taiwan-based provider of industrial networking, computing and automation solutions.

An advisory published this week by Netherlands-based industrial cybersecurity services provider Applied Risk reveals that Moxa EDS-405A/EDS-408A series managed ethernet switches, which are widely used in industrial facilities across different critical sectors, are plagued by three types of vulnerabilities.

“An authenticated remote attacker could compromise the availability, integrity and confidentiality of a Moxa industrial managed switch, including connected industrial assets,” Applied Risk wrote in its advisory.

2014 ICS Cyber Security Conference
Register for the 2015 ICS Cyber Security Conference!

The most serious of the weaknesses identified by experts, with a CVSS score of 8.5, is a privilege escalation vulnerability affecting the device’s administrative web interface. According to researchers, an attacker can bypass the protection mechanism designed to ensure that by default user-level accounts only have read-only access to the web interface. A malicious actor could exploit the flaw to elevate privileges in the web interface.

Another vulnerability, with a CVSS score of 6.8, is a denial-of-service (DoS) issue that allows an authenticated attacker to cause a device to reboot via a specially crafted URL. The security hole exists in the embedded GoAhead web server running on affected Moxa switches.

The last vulnerability identified by Applied Risk is a cross-site scripting (XSS) bug in the administrative web interface. An attacker can exploit the flaw to inject arbitrary JavaScript code into an input field found in the admin interface.

The vulnerabilities have been tested on a Moxa EDS-405A switch running version 3.4 of the firmware. Moxa addressed the security bugs on August 26 with the release of version 3.6 for EDS-405A series switches, and version 3.5 for EDS-408A series switches.

Applied Risk disclosed the vulnerabilities directly to the vendor earlier this year. The security firm told SecurityWeek that it’s currently in contact with ICS-CERT to get CVE identifiers assigned to the flaws.

The existence of security holes in industrial ethernet switches can have serious consequences. At the recent Black Hat conference, researchers disclosed a series of vulnerabilities in such devices manufactured by Siemens, GE, Garrettcom and Opengear.

“Compromising any switch allows the creation of malicious firmwares for further MITM manipulation of a live process. Such MITM manipulation can lead to the plant or process shutting down (think: nuclear reactor SCRAM) or getting into a unknown and hazardous state (think: damaging a blast furnace at a steel mill),” the researchers explained.

In addition to the patches for industrial switch vulnerabilities, Moxa released an update to address a total of nine heap-based buffer overflow (CVE-2015-6457) and classic buffer overflow (CVE-2015-6458) weaknesses in SoftCMS, a central management software designed for large-scale CCTV installations.

The bugs, discovered by Carsten Eiram of Risk Based Security and Fritz Sands, can be exploited to crash the software and possibly even for remote code execution. The issues impact version 1.3 and prior of SoftCMS, and they have been fixed with the release of version 1.4 on June 1.

Related: Learn More at the ICS Cyber Security Conference

Related: Moxa Industrial Surveillance Products Affected by RCE Vulnerability

Related: Alerts Issued for Zero-Day Flaws in SCADA Systems

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.