Moxa MB3170/MB3180/MB3270/MB3280/MB3480/MB3660 Series Protocol Gateways Vulnerabilities
Multiple critical vulnerabilities exist in Moxa MB3170/MB3180/MB3270/MB3280/MB3480/MB3660 Series Protocol Gateways affecting all versions. These include: - Stack-based buffer overflow in built-in web server (CVE-2019-9099): allows remote denial-of-service and arbitrary code execution - Integer overflow leading to buffer overflow (CVE-2019-9098): causes unexpected memory allocation and buffer overflow - CSRF protection bypass (CVE-2019-9102): predictable token generation allows attackers to bypass cross-site request forgery protection - Weak cryptographic algorithm (CVE-2019-9095): uses predictable variables, allowing sensitive information disclosure - Unauthenticated information exposure (CVE-2019-9103): attackers can access sensitive information and usernames via web service without authorization - Cleartext credential transmission (CVE-2019-9101): credentials sent unencrypted over web applications - Weak password requirements (CVE-2019-9096): allows brute-force credential attacks - Cleartext credential storage (CVE-2019-9104): sensitive data stored unencrypted in configuration files - Denial-of-service via resource exhaustion (CVE-2019-9097): web service crashes when overloaded
- Network access to the gateway's HTTP/web service port (typically port 80 or 443)
- For credential-based attacks: ability to observe network traffic or file system access to capture credentials
- For buffer overflow exploitation: no authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/64454ceb-5d3e-47fe-b580-475e17dc98ce