As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories

SUMMARY

NPort IA5000A Series Serial Device Servers Vulnerabilities

  • Security Advisory ID: MPSA-210401
  • Version: V1.0
  • Release Date: Apr 28, 2021
  • Reference:
    • CVE-2020-27149, CVE-2020-27150, CVE-2020-27184, CVE-2020-27185
    • KLCERT-20-018, KLCERT-20-019, KLCERT-20-020, KLCERT-20-021

Multiple product vulnerabilities were identified in Moxa’s NPort IA5000A Series Serial Device Servers. In response to this, Moxa has developed related solutions to address these vulnerabilities.

The identified vulnerability types and potential impacts are shown below:

Item Vulnerability Type Impact
1 Improper Access Control (CWE-284)
CVE-2020-27149, KLCERT-20-018
Attackers can exploit this vulnerability to elevate the privilege level of the user controlled by them or to receive requests that require a higher privilege level.
2 Unprotected Storage of Credentials (CWE-256)
CVE-2020-27150, KLCERT-20-019
An attacker can extract authentication credentials from a configuration file sent over an insecure communication channel. The data extracted can subsequently be used to authenticate via Moxa Service and change the device’s configurations.
3 Cleartext Transmission of Sensitive Information (CWE-319)
CVE-2020-27184, KLCERT-20-020
An attacker could read all data transferred between the client and the device if the communication is carried out over Telnet, including authentication credentials, device configuration data, the device version, and other sensitive data.
4 Cleartext Transmission of Sensitive Information (CWE-319)
CVE-2020-27185, KLCERT-20-021
Successfully exploiting this vulnerability could enable attackers to read all traffic sent when Moxa Service is enabled. This includes authentication data, device configurations, the device version, and other sensitive data.
AFFECTED PRODUCTS AND SOLUTIONS

Affected Products:

The affected products and firmware versions are shown below.

Product Series Affected Versions
NPort IA5150A/IA5250A Series Firmware Version 1.4 or lower
NPort IA5450A Series Firmware version 1.7 or lower.

 

Solutions:

Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.

Product Series Solutions
NPort IA5000A Series
  • For item 1 (CVE-2020-27149): NPort IA5150A/IA5250A Series, please upgrade to firmware version 1.5 or higher. For NPort IA5450A Series, please upgrade to firmware version 2.0 or higher. You can download it from here.
  • For item 2 (CVE-2020-27150), Moxa products support a pre-shared key function to encode the configuration file to mitigate this risk. Please refer to the Export/Import section in the user manual for more details.
  • For item 3 (CVE-2020-27184), Moxa products can disable the Telnet service to mitigate this risk. Please refer to the Console Settings section in the user manual for more details. Firmware version 1.5 or higher will disable Telnet by default on the NPort IA5150A/IA5250A Series. Firmware version 2.0 or higher will disable Telnet by default on the NPort IA5450A Series.
  • For item 4 (CVE-2020-27185), Moxa products can disable Moxa Service to mitigate this risk. Please refer to the Console Settings section in the user manual for more details.

Acknowledgment:

We would like to express our appreciation to Alexander Nochvay from Kaspersky Lab ICS CERT for reporting the vulnerability, working with us to help enhance the security of our products, and helping us provide a better service to our customers.
 

Revision History:

VERSION DESCRIPTION RELEASE DATE
1.0 First Release Apr 28, 2021

Relevant Products

NPort IA5000A Series ·

  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!
Feedback