SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-329514249] Moxa EDR-G903 Secure Router Vulnerabilities

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2016-05-17OTHERMoxa EDR-G903Maxim RuppN/A2016-0875, 2016-0876, 2016-0877, 2016-0878, 2016-0879N/AN/AN/A

Source

						
							
								
#
# Moxa EDR-G903 Secure Router Vulnerabilities
#


### OVERVIEW

Independent researcher Maxim Rupp has identified vulnerabilities in Moxa's ECR-G903 secure routers. Moxa has produced a new firmware version to mitigate these vulnerabilities.

These vulnerabilities could be exploited remotely.




### AFFECTED PRODUCTS

The following Moxa Secure Routers are affected:

EDR-G903 Versions V3.4.11 and older




### IMPACT

Successful exploitation of these vulnerabilities may allow a remote attacker to escalate privileges, initiate a denial-of-service condition, and execute arbitrary code.
Impact to individual organizations depends on many factors that are unique to each organization.




### BACKGROUND

Moxa is a Taiwan-based company that maintains offices in several countries around the world, including the US, UK, India, Germany, France, China, Russia, and Brazil.

The affected product, Moxa EDR-G903 series, is an industrial virtual private network (VPN) server with firewall/NAT all-in-one secure router. It is designed for Ethernet security applications in sensitive remote control or monitoring networks, According to Moxa, these secure routers are deployed across several sectors, including, Commercial Facilities, Critical Manufacturing, Emergency Services, Energy, and others. Moxa estimates that these products are used globally but concentrated in the US, Europe, Chile, Argentina, Peru, Columbia, and Taiwan; 50 to 60 percent of all sales are in the US.




### VULNERABILITY CHARACTERIZATION

# VULNERABILITY OVERVIEW

PRIVILEGE ESCALATION

By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access configuration and log files.
CVE-2016-0875 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).



PLAINTEXT STORAGE OF A PASSWORD

Configuration files contain passwords in plaintext.
CVE-2016-0876 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).



MEMORY LEAK

Ping function is available to every user, which may cause a memory leak in the affected device.
CVE-2016-0877 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H).



DENIAL OF SERVICE

By sending malicious requests in the form of a ping twice, the device independently produces "Cold start."
CVE-2016-0878 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).



UNAUTHENTICATED FILE DOWNLOAD

After using the import function of configuration or log files they are not deleted from server side, and any attacker is able to download them "without authenticating" by accessing a specific URL.

CVE-2016-0879 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H).




### VULNERABILITY DETAILS


# EXPLOITABILITY

This vulnerability could be exploited remotely.


# EXISTENCE OF EXPLOIT

No known public exploits specifically target these vulnerabilities.


# DIFFICULTY

An attacker with a low skill would be able to exploit this vulnerability.





### MITIGATION

Moxa has created firmware version v3.4.12, and it is available to users upon request.

http://www.moxa.com/support/request_support.aspx