Moxa Moxa’s Response Regarding the CPU Hardware Vulnerability to Side-Channel Attacks (Meltdown & Spectre)
Moxa's response to CPU hardware vulnerabilities CVE-2017-5753 (Spectre), CVE-2017-5715 (Spectre variant 2), and CVE-2017-5754 (Meltdown) announced in January 2018. These are side-channel attacks on microprocessor speculative execution that could allow an attacker to read kernel memory or microprocessor information. Most Moxa products operate on closed systems and do not allow arbitrary code execution. Moxa devices using general-purpose computer platforms with vulnerable microprocessors may be indirectly affected. Vendor mitigation updates are available for microprocessor and operating system vendors; Moxa states it will release updates based on vendor guidance.
- Ability to execute arbitrary code on the target Moxa device
- Device must run on a processor with Spectre/Meltdown vulnerability
- Access to the device or a way to place malicious code on it
Patching may require device reboot — plan for process interruption
/api/v1/advisories/65f597de-7860-484c-b005-8c8bcfb0fc8dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.