As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories

SUMMARY

EDR-810 Series Secure Router Vulnerabilities

  • Security Advisory ID: MCSA-171103
  • Version: 1.0
  • Release Date: May 22, 2018
  • Reference:

Multiple product vulnerabilities were identified in Moxa’s EDR-810 Series Secure Router. In response to this, Moxa has developed related solutions to address these vulnerabilities.

The identified vulnerability types and potential impacts are shown below:

Item Vulnerability Type Impact
1 Web Server Ping Command Injection (TALOS-2017-0472) A specially crafted HTTP POST can cause a privilege escalation resulting in a root shell. An attacker can inject OS commands to trigger this vulnerability
2 Web RSA Key Generation Command Injection (TALOS-2017-0473) A specially crafted HTTP POST can cause a privilege escalation resulting in a root shell. An attacker can inject OS commands to trigger this vulnerability.
3 Web Server strcmp Multiple Denial of Service (TALOS-2017-0474) A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a specified request to trigger this vulnerability.
4 Clear Text Transmission of Password (TALOS-2017-0475) An attacker can look at network traffic to get the admin password for the device. The attacker can then use the credentials to log in as admin.
5 Web Server URI Denial of Service (TALOS-2017-0476) An attacker can send a crafted URI to trigger this vulnerability.
6 Web Server Certificate Signing Request Command Injection (TALOS-2017-0477) A specially crafted HTTP POST can cause a privilege escalation resulting in a root shell. An attacker can inject OS commands to trigger this vulnerability.
7 Web Server Cross-Site Request Forgery (TALOS-2017-0478) A specially crafted HTTP packet can cause a cross-site request forgery. An attacker can create malicious HTML to trigger this vulnerability.
8 Plaintext Password Storage (TALOS-2017-0479) An attacker with shell access could extract passwords in clear text from the device.
9 Server Agent Information Disclosure (TALOS-2017-0480) A specially crafted TCP packet can cause information disclosure. An attacker can send a crafted TCP packet to trigger this vulnerability.
10 Web Server Weak Cryptography for Passwords (TALOS-2017-0481) An attacker could intercept weakly encrypted passwords and could use brute force to break them.
11 Web Server OpenVPN Config Multiple Command Injection (TALOS-2017-0482) A specially crafted HTTP POST can cause a privilege escalation resulting in a root shell. An attacker can inject OS commands to trigger this vulnerability.
12 Service Agent Multiple Denial of Service (TALOS-2017-0487) A specially crafted packet can cause a denial of service.
AFFECTED PRODUCTS AND SOLUTIONS

Affected Products

The affected products and firmware versions are shown below.

Product Series Affected Version
EDR-810 Series Firmware Version 3.13 or prior

 

Solutions

Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for the affected products are shown below.

Product Series Solutions
EDR-810 Series For item 4 - Clear Text Transmission of Password (TALOS-2017-0475), Moxa suggests users can go to the "User Interface Management" page to disable the HTTP connection and use HTTPS to access the web console.
For item 9 - Server Agent Information Disclosure (TALOS-2017-0480), Moxa suggests users can go to the "User Interface Management" page to disable Moxa Utility interface.
Please download the new firmware/software here.

 

Revision History

Version Description Release Date
1.0 First Release May 22, 2018

Relevant Products

EDR-810 Series ·

  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!
Feedback