当前位置:网站首页>Moxa NPort device flaw could expose critical infrastructure to devastating attack
Moxa NPort device flaw could expose critical infrastructure to devastating attack
2022-07-31 02:46:00 【Network Research Institute】
Two potentially critical vulnerabilities that could allow threat actors to wreak havoc have been discovered in widely used industrial connected devices manufactured by Moxa.
The Taiwan-based provider of industrial networking and automation solutions has addressed these deficiencies.
The two security vulnerabilities, tracked as CVE-2022-2043 and CVE-2022-2044, rated "High Severity", affect Moxa's NPort 5110 device server, which is designed to connect serial devices toto the Ethernet network.A remote attacker could exploit these vulnerabilities to put a target device into a Denial of Service (DoS) state.
Moxa and the U.S. Cybersecurity and Infrastructure Security Agency ( CISA ) have issued advisories for these vulnerabilities.Moxa said only firmware version 2.10 was affected, and instructed customers to contact their technical support for assistance.CISA asked affected organizations to contact Moxa for security patches.
Moxa and CISA both praised Jens Nielsen, a researcher at Danish industrial cybersecurity firm En Garde Security, for reporting the vulnerabilities.
In a blog post published this week, En Garde Security owner Mikael Vingaard said his company's research department discovered the vulnerabilities in the first half of March 2022, when a proof-of-concept (PoC) was made available to the vendor.) script and a video showing the exploit.
Vingaard told us that while Moxa NPort devices should not be exposed to the Internet, many devices are actually accessible over the network.A Shodan search revealed over 5,000 devices, and while there may be some honeypots, they can't all be honeypots.
He said that exploiting the two flaws only requires a network connection to the target device.Exploits can be executed "in seconds" and can be automated over the internet.
Affected NPort devices are used worldwide, including in critical infrastructure sectors such as energy, critical manufacturing and transportation systems.There were reports that these types of equipment were targeted for sabotage in an attack on Ukraine's power grid in 2015, causing severe power outages.
Exploiting the vulnerabilities discovered by En Garde researchers could disrupt critical services in these sectors, Vingaard described vulnerable Moxa devices as "a small fraction of our society's vital infrastructure services."
He explained that the first DoS vulnerability could allow an attacker to make a target device stop responding to legitimate commands.
“The only way to regain control of the equipment is to have staff power off/on the equipment, which requires someone to be physically present,” “This can often cause problems in remote areas where it can take a significant amount of time to get people on site, andNot ideal in situations where time to regain control may be important."
The second vulnerability is an out-of-bounds issue where an attacker can access and/or overwrite elements on the device, resulting in data corruption or corruption.This renders the system inoperable and in some cases may cause permanent damage to the device.
边栏推荐
- First acquaintance with C language -- array
- Word/Excel fixed table size, when filling in the content, the table does not change with the cell content
- CorelDRAW2022精简亚太新增功能详细介绍
- mysql index
- TCP/IP four-layer model
- 开题报告之论文框架
- Project (5) - Small target detection tph-yolov5
- LeetCode 1161 最大层内元素和[BFS 二叉树] HERODING的LeetCode之路
- Mathematics to solve the problem - circular linked list
- STM32CUBEMX开发GD32F303(11)----ADC在DMA模式下扫描多个通道
猜你喜欢
f.grid_sample
YOLOV5 study notes (2) - environment installation + operation + training
【银行系列第一期】中国人民银行
The application of AI in the whole process of medical imaging equipment
There is a problem with the multiplayer-hlap package and the solution cannot be upgraded
Intranet Infiltration - Privilege Escalation
4. Sensitive word filtering (prefix tree)
英特尔软硬优化,赋能东软加速智慧医疗时代到来
公司官网建站笔记(六):域名进行公安备案并将备案号显示在网页底部
19.支持向量机-优化目标和大间距直观理解
随机推荐
print task sorting js od huawei
The final exam first year course
Basic learning about Redis related content
CentOS7下mysql5.7.37的安装【完美方案】
f.grid_sample
修改未正确放入沙盒造成苹果兼容性问题
CorelDRAW2022精简亚太新增功能详细介绍
Live Preview | KDD2022 Doctoral Dissertation Award Champion and Runner-up Dialogue
The real CTO is a technical person who understands products
Layer 2 broadcast storm (cause + judgment + solution)
工程(五)——小目标检测tph-yolov5
The whole process scheduling, MySQL and Sqoop
[Android] Room - Alternative to SQLite
LeetCode Daily Question 2022/7/25-2022/7/31
医疗影像领域AI软件开发流程
Introduction to flask series 】 【 flask - using SQLAlchemy
19. Support Vector Machines - Intuitive Understanding of Optimization Objectives and Large Spacing
【C语言】表达式求值的一般方法
Intel's software and hardware optimization empowers Neusoft to accelerate the arrival of the era of smart medical care
Static routing + PAT + static NAT (explanation + experiment)