Moxa ioLogik E1200 Series and ioLogik E2200 Series Controllers and I/O Vulnerabilities
Moxa ioLogik E1200 and E2200 Series Controllers contain multiple web interface vulnerabilities: 1. Stored XSS (CVE-2016-8359): An authenticated user can execute arbitrary code through the web console. 2. Unencrypted password transmission (CVE-2016-8372): Passwords are transmitted via HTTP GET requests without encryption. 3. Password truncation (CVE-2016-8379): Weak password storage allows brute-force attacks against simple passwords. 4. Missing CSRF protection (CVE-2016-8350): Attackers can force legitimate users to make unauthorized requests to the controller. These devices are remote I/O controllers commonly deployed in industrial networks for analog/digital signal acquisition and control.
- Network access to the web interface (typically HTTP port 80 or 443)
- For XSS and CSRF exploitation: an authenticated user logged into the web console
- For credential interception: traffic visibility on the network segment (no HTTPS)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5ad7ddb2-f7b8-4382-8f33-cbe059cc899e