Moxa cleared 17 vulnerabilities in one of its industrial routers.
The security holes, which included command injection and denial-of-service (DoS) issues, have been identified by Cisco Talos researchers in Moxa EDR-810, an integrated industrial multiport secure router that provides firewall, NAT, VPN and managed Layer 2 switch capabilities.
The device is meant to control, monitor and protect critical assets, such as pumping and treatment systems in water stations, PLC and SCADA systems in factory automation applications, and DCS in oil and gas organizations, Moxa said.
Several of the issues are high severity command injection holes affecting the web server functionality. As a result of the vulnerabilities, an attacker could escalate privileges and obtain a root shell on the system by sending specially crafted HTTP POST requests to the targeted device.
The router is also impacted by several high severity DoS flaws an attacker could exploit by sending specially crafted requests to the device.
There are also four medium severity issues related to the transmission of passwords in clear text, information disclosure involving the Server Agent functionality, and the use of weakly encrypted or clear text passwords.
Cisco has made available technical details and proof-of-concept (PoC) code for each of the vulnerabilities.
The vulnerabilities have been reproduced on Moxa EDR-810 v4.1 devices, and they have been patched by the vendor with the release of version 4.2 on April 12. The issues were reported to Moxa in mid and late November 2017.