Moxa OnCell
Moxa OnCell G3110-HSDPA, G3150-HSDPA, and G3110-HSPA cellular gateways contain multiple authentication and session management flaws (CWE-307 password reset, CWE-256 weak password, CWE-352 CSRF) that allow unauthenticated remote attackers to gain administrative access to the device. These devices are end-of-life and will not receive vendor patches. An attacker with network access to the device's management ports can assume admin privileges, reconfigure routing, disable security, or monitor communications between SCADA systems and remote locations.
- Network access to the OnCell device management interface (default port 502 or port 80 for web interface)
- No authentication required - device allows unauthenticated administrative access
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2e4c5d74-b00e-461f-ab02-7020af018d76Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.