当前位置:网站首页>Moxa NPort device flaw could expose critical infrastructure to devastating attack
Moxa NPort device flaw could expose critical infrastructure to devastating attack
2022-07-31 02:46:00 【Network Research Institute】
Two potentially critical vulnerabilities that could allow threat actors to wreak havoc have been discovered in widely used industrial connected devices manufactured by Moxa.
The Taiwan-based provider of industrial networking and automation solutions has addressed these deficiencies.
The two security vulnerabilities, tracked as CVE-2022-2043 and CVE-2022-2044, rated "High Severity", affect Moxa's NPort 5110 device server, which is designed to connect serial devices toto the Ethernet network.A remote attacker could exploit these vulnerabilities to put a target device into a Denial of Service (DoS) state.
Moxa and the U.S. Cybersecurity and Infrastructure Security Agency ( CISA ) have issued advisories for these vulnerabilities.Moxa said only firmware version 2.10 was affected, and instructed customers to contact their technical support for assistance.CISA asked affected organizations to contact Moxa for security patches.
Moxa and CISA both praised Jens Nielsen, a researcher at Danish industrial cybersecurity firm En Garde Security, for reporting the vulnerabilities.
In a blog post published this week, En Garde Security owner Mikael Vingaard said his company's research department discovered the vulnerabilities in the first half of March 2022, when a proof-of-concept (PoC) was made available to the vendor.) script and a video showing the exploit.
Vingaard told us that while Moxa NPort devices should not be exposed to the Internet, many devices are actually accessible over the network.A Shodan search revealed over 5,000 devices, and while there may be some honeypots, they can't all be honeypots.
He said that exploiting the two flaws only requires a network connection to the target device.Exploits can be executed "in seconds" and can be automated over the internet.
Affected NPort devices are used worldwide, including in critical infrastructure sectors such as energy, critical manufacturing and transportation systems.There were reports that these types of equipment were targeted for sabotage in an attack on Ukraine's power grid in 2015, causing severe power outages.
Exploiting the vulnerabilities discovered by En Garde researchers could disrupt critical services in these sectors, Vingaard described vulnerable Moxa devices as "a small fraction of our society's vital infrastructure services."
He explained that the first DoS vulnerability could allow an attacker to make a target device stop responding to legitimate commands.
“The only way to regain control of the equipment is to have staff power off/on the equipment, which requires someone to be physically present,” “This can often cause problems in remote areas where it can take a significant amount of time to get people on site, andNot ideal in situations where time to regain control may be important."
The second vulnerability is an out-of-bounds issue where an attacker can access and/or overwrite elements on the device, resulting in data corruption or corruption.This renders the system inoperable and in some cases may cause permanent damage to the device.
边栏推荐
- C#远程调试
- AtCoder Beginner Contest 261 Partial Solution
- The use of font compression artifact font-spider
- CentOS7下mysql5.7.37的安装【完美方案】
- Introduction to flask series 】 【 flask - using SQLAlchemy
- mysql index
- JS 函数 this上下文 运行时点语法 圆括号 数组 IIFE 定时器 延时器 self.备份上下文 call apply
- User interaction + formatted output
- Brute Force/Adjacency List Breadth First Directed Weighted Graph Undirected Weighted Graph
- Chapter 9 SVM实践
猜你喜欢
[Android] Room - Alternative to SQLite
学习DAVID数据库(1)
1. Non-type template parameters 2. Specialization of templates 3. Explanation of inheritance
Difference between CMOS and TTL?
There is a problem with the multiplayer-hlap package and the solution cannot be upgraded
工程(五)——小目标检测tph-yolov5
YOLOV5 study notes (3) - detailed explanation of network module
221. Largest Square
Mathematics to solve the problem - circular linked list
8. Unified exception handling (controller notifies @ControllerAdvice global configuration class, @ExceptionHandler handles exceptions uniformly)
随机推荐
11、Redis实现关注、取消关注以及关注和粉丝列表
7. List of private messages
BAT卖不动「医疗云」:医院逃离、山头林立、行有行规
SQL注入 Less46(order by后的注入+rand()布尔盲注)
如何搭建私有yum源
The Sad History of Image Processing Technology
Static route analysis (the longest mask matching principle + active and standby routes)
AI software development process in medical imaging field
你们程序员为什么不靠自己的项目谋生?而必须为其他人打工?
10. Redis implements likes (Set) and obtains the total number of likes
【shell基础】判断目录是否为空
The final exam first year course
什么是分布式锁?实现分布式锁的三种方式
MPPT solar charge controller data collection - through the gateway acquisition capacity battery SOC battery voltage, wi-fi
f.grid_sample
The effective square of the test (one question of the day 7/29)
The modification is not properly placed in the sandbox, causing Apple compatibility issues
Linux下redis7的安装,启动与停止
19. Support Vector Machines - Intuitive Understanding of Optimization Objectives and Large Spacing
15、网站统计数据