Moxa ioPAC 8500 and ioPAC 8600 Series (IEC Models) Controllers Vulnerabilities
Moxa ioPAC 8500 and 8600 Series (IEC models) rugged modular programmable controllers contain multiple vulnerabilities: (1) Relative path traversal (CVE-2020-25176) allows unauthenticated remote attackers to traverse the application directory, potentially leading to remote code execution; (2) Cleartext transmission of sensitive information (CVE-2020-25178) enables remote attackers to upload, read, and delete files unencrypted; (3) Hard-coded cryptographic key (CVE-2020-25180) allows unauthenticated remote attackers to pass their own encrypted password to the ISaGRAF 5 Runtime, resulting in information disclosure; (4) Unprotected storage of credentials (CVE-2020-25184) allows unauthenticated on-site attackers to compromise user passwords.
- Network access to the ioPAC web interface (typically port 80/443)
- Physical access to the device to recover plaintext credentials from storage (CVE-2020-25184)
- No authentication required for path traversal, cleartext file transfer, and hardcoded key exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bb040687-8aac-4989-af9f-a3b603239562