Moxa NPort 5210 5230 5232
A resource exhaustion vulnerability in Moxa NPort 5210, 5230, and 5232 serial device servers allows a remote attacker to send TCP SYN packets that cause the device to become unavailable. The affected firmware versions are 2.9 and earlier (specifically 17030709 and earlier). Successful exploitation results in denial of service—the device stops responding to all traffic, including legitimate management and serial connections, until manually rebooted. No public exploit is currently known, but the attack is trivial to execute (basic SYN flood).
- Network-reachable access to the NPort device on standard TCP ports
- No authentication or credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b61d2169-19d3-4f86-842c-79beabeff9b2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.