Moxa created new firmware editions to mitigate vulnerabilities in its MiiNePort, according to a report with ICS-CERT.
These vulnerabilities, discovered by independent researcher Aditya Sood, are remotely exploitable.
Moxa reports that the vulnerabilities affect the following versions of MiiNePort:
• MiiNePort E1 versions prior to 1.8
• MiiNePort E2 versions prior to 1.4
• MiiNePort E3 versions prior to 1.1
An attacker may be able to gain user-level access to the target system by exploiting these vulnerabilities.
Moxa is a Taiwan-based company that maintains offices in several countries around the world, including the U.S., the UK, India, Germany, France, China, Russia, and Brazil.
The affected product, MiiNePort, is a serial device server module. MiiNePort sees action across several sectors including commercial facilities, critical manufacturing, energy, and transportation systems. Moxa estimates this product sees use primarily in the United States and Europe with a small percentage in Asia.
In one scenario, an attacker may be able to brute force an active session cookie to download configuration files.
CVE-2016-9344 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 5.3.
In another hole, configuration data end up stored in a file not encrypted.
CVE-2016-9346 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 5.3.
No known public exploits specifically target these vulnerabilities. However, an attacker with a low skill would be able to exploit these vulnerabilities.
Moxa released new firmware editions, which address the identified vulnerabilities in MiiNePort devices. Moxa recommends installing these new firmware editions:
• MiiNePort E1 Series, Edition 1.8
• MiiNePort E2 Series, Edition 1.4
• MiiNePort E3 Series, Edition 1.1