SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-553164049] Moxa NPort 5110, 5130, and 5150

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2017-11-16OtherMoxa Florian Adamsky reported the vulnerabilities to ICS-CERT and tested the new firmware.N/ACVE-2017-1671 CVE-2017-1671 CVE-2017-1402 N/AN/AN/A

Source

						
							
								
#
# Moxa NPort 5110, 5130, and 5150
#


### VULNERABLE VENDOR
Moxa 


### VULNERABLE PRODUCT
NPort 5110, 5130, 5150 


### RESEARCHER
Florian Adamsky reported the vulnerabilities to ICS-CERT and tested the new firmware.


### AFFECTED PRODUCTS
The following versions of NPort, a serial network interface, are affected:

NPort 5110 Version 2.2,
NPort 5110 Version 2.4,
NPort 5110 Version 2.6,
NPort 5110 Version 2.7,
NPort 5130 Version 3.7 and prior, and
NPort 5150 Version 3.7 and prior


### IMPACT
Successful exploitation of these vulnerabilities could allow for remote code execution on the device.


### VULNERABILITY OVERVIEW
IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS IN OUTPUT USED BY A DOWNSTREAM COMPONENT ('INJECTION') CWE-74
An attacker may be able to inject packets that could potentially disrupt the availability of the device.
CVE-2017-16719 has been assigned to this vulnerability.
A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


INFORMATION EXPOSURE CWE-200
An attacker may be able to exploit a flaw in the handling of Ethernet frame padding that may allow for information exposure.
CVE-2017-16715 has been assigned to this vulnerability.
A CVSS v3 base score of 8.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)


UNCONTROLLED RESOURCE CONSUMPTION ('RESOURCE EXHAUSTION') CWE-400
An attacker may be able to exhaust memory resources by sending a large amount of TCP SYN packets.
CVE-2017-14028 has been assigned to this vulnerability.
A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)





### BACKGROUND
Critical Infrastructure Sectors: Critical Manufacturing, Energy, and Transportation Systems
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Taiwan




### MITIGATION

Moxa has produced new firmware for the affected devices that can be downloaded from:

NPort 5110 https://www.moxa.com/support/download.aspx?type=support&id=882


NPort 5130 and NPort 5150 https://www.moxa.com/support/download.aspx?type=support&id=356