Industrial networking, computing and automation solutions provider Moxa has released a firmware update for one of its industrial secure routers to address several high severity vulnerabilities that can be exploited for denial-of-service (DoS) attacks, privilege escalation, and arbitrary code execution.
Moxa’s EDR-G903 series is a high-performance industrial router that provides firewall, VPN and NAT capabilities. The product is used in the United States, Europe and South America in sectors such as critical manufacturing, commercial facilities, energy, and emergency services.
Maxim Rupp, a researcher who specializes in ICS security, discovered in January that the product is plagued by multiple high severity flaws that can be exploited remotely. The expert told SecurityWeek that many of the vulnerable devices are exposed to the Internet.
Rupp analyzed Moxa EDR-G903 routers and found that configuration and log files can be accessed on the web server simply by accessing a specific URL (CVE-2016-0875). Another issue is related to the fact that the configuration files store passwords in plain text (CVE-2016-0876).
According to ICS-CERT, the expert also discovered that after configuration and log files are imported, they are not deleted from the server, allowing an unauthenticated attacker to download them by accessing a specific URL (CVE-2016-0879).
A remote attacker can also cause the device to enter a DoS condition by sending it malicious requests (CVE-2016-087).
Finally, the researcher discovered that the Moxa router’s ping function is available to every user, which could lead to a memory leak (CVE-2016-0877).
Registration and Call for Papers for 2016 ICS Cyber Security Conference Now Open
The vulnerabilities affect EDR-G903 running firmware versions 3.4.11 and older, and Moxa claims to have patched them with the release of version 3.4.12. Rupp has not tested the firmware update and could not confirm that it resolves the issues.
In the past, Maxim Rupp reported finding security holes in Accuenergy’s Acuvim power meters, Sierra Wireless’ ACEmanager, XZERES wind turbines, Tollgrade’s LightHouse SMS power distribution monitoring product, Honeywell’s Tuxedo Touch automation controllers and Midas gas detectors, Chiyu Technology fingerprint access controllers, and an ICONICS web-based HMI.
Related: Moxa Patches Flaws in Industrial Ethernet Switches
Related: Moxa Industrial Surveillance Products Affected by RCE Vulnerability

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- NIST Publishes Final Version of 800-82r3 OT Security Guide
- Johnson Controls Hit by Ransomware
- Verisoul Raises $3.25 Million in Seed Funding to Detect Fake Users
- Government Shutdown Could Bench 80% of CISA Staff
- Google Rushes to Patch New Zero-Day Exploited by Spyware Vendor
- macOS 14 Sonoma Patches 60 Vulnerabilities
- New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
Latest News
- Bankrupt IronNet Shuts Down Operations
- AWS Using MadPot Decoy System to Disrupt APTs, Botnets
- Generative AI Startup Nexusflow Raises $10.6 Million
- In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea
- Researchers Extract Sounds From Still Images on Smartphone Cameras
- National Security Agency is Starting an Artificial Intelligence Security Center
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks
