Moxa created new firmware to mitigate multiple vulnerabilities in its OnCell products, according to an updated report with ICS-CERT.
These vulnerabilities, discovered by independent researcher Maxim Rupp, are remotely exploitable.
Moxa reports that the vulnerability affects the following products:
• OnCell G3100V2 Series, editions prior to Version 2.8
• OnCell G3111/G3151/G3211/G3251 Series, editions prior to Version 1.7
An attacker could exploit these vulnerabilities to bypass authentication to log in as a valid user.
Moxa is a Taiwan-based company that maintains offices in several countries around the world, including the U.S., UK, India, Germany, France, China, Russia, and Brazil.
The affected products, OnCell 31XX and 32XX series devices, are cellular IP gateways that can connect serial or Ethernet devices to a cellular network. OnCell IP gateways see action across several sectors including commercial facilities, critical manufacturing, energy, and transportation systems. Moxa said these products see use primarily in Asia and Europe.
In an improper restriction of excessive authentication attempts, an attacker could freely use brute force to determine parameters needed to bypass authentication.
CVE-2016-5799 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.
In addition, a configuration file contains parameters that represent passwords in plaintext.
CVE-2016-5812 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 3.3.
Also, a reflected cross-site scripting attack may allow an attacker to execute arbitrary script code in the user’s browser within the trust relationship between their browser and the server.
CVE-2016-5819 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 6.5.
No known public exploits specifically target these vulnerabilities. However, an attacker with a low skill would be able to exploit these vulnerabilities.
Moxa has made firmware fixes available on their web site at the following locations:
Moxa offered this advice for upgrading firmware:
The OnCell G3111/G3151-HSPA’s firmware can end up upgraded though the web console, serial console, or through OnCell Search Utility. However, Moxa recommends a local (LAN) connection to the OnCell to minimize the risk of a broken connection during the upgrade process. If you have made any changes to your configuration, remember to save the configuration first before upgrading the firmware. Any unsaved changes will end up discarded when the firmware upgrades. To upgrade the firmware, simply browse to the location of the firmware on your PC, and select submit.