Governance & Risk Management
,
Operational Technology (OT)
Flaws Enable Privilege Escalation and Remote Exploitation
Taiwanese industrial computing firm Moxa Technologies is warning customers about two high-severity vulnerabilities affecting its routers and network appliances, posing significant security risks to operational technology environments.
See Also: ESG Report: Analyzing the Economic Benefits of Palo Alto Networks Industrial OT Security
The vulnerabilities tracked as CVE-2024-9138 and CVE-2024-9140. The flaws impact multiple Moxa product series, including EDR-810, EDR-8010, NAT-102 and OnCell G4302-LTE4.
Typical customers of Moxa’s Industrial routers and network appliances use the routers for remote monitoring, real-time data collection for IoT applications, connecting and isolating industrial control systems and programmable logic controllers.
Customers include industrial automation, factories and manufacturing plants, power grids, renewable energy plants, water utilities and transportation and logistics for fleet management and vehicle tracking for real-time data transmission.
The advisory comes only weeks after Chinese-manufactured Four-Faith industrial routers were exploited by hackers using a high-severity command injection vulnerability affecting F3x24 and F3x36 router models (see: Four-Faith Routers Exploited Using New Flaw).
The vulnerability are tracked as CVE-2024-9138 arises from hard-coded credentials, enabling authenticated attackers to escalate privileges and gain root-level access.
CVE-2024-9140 allows attackers to exploit OS command injection vulnerabilities, potentially enabling unauthorized code execution and system control.
According to Moxa, CVE-2024-9138 has a CVSS score of 7.2, indicating high severity, while CVE-2024-9140 is rated critical with a CVSS score of 9.8. Attackers exploiting these flaws could disrupt services, manipulate critical data or entirely compromise affected devices, the advisory said.
Moxa recommends limiting network exposure, restricting SSH access to trusted IP addresses, and implementing intrusion detection and prevention systems as interim security measures.
The advisory clarified that the vulnerabilities do not impact certain product lines, including the MRC-1002 Series, TN-5900 Series and OnCell 3120-LTE-1 Series.