Moxa MXsecurity Series Multiple Vulnerabilities
Moxa MXsecurity Series contains multiple critical authentication and input validation vulnerabilities across all versions: 1. CVE-2023-39979: Small space of random values allows attackers to bypass authentication entirely and gain unauthorized access without credentials (CVSS 9.8). 2. CVE-2023-39980: SQL injection in the device allows authenticated attackers to modify SQL commands and disclose sensitive information (CVSS 7.1). 3. CVE-2023-39981: Improper authentication implementation allows unauthenticated attackers to disclose device information and configuration details (CVSS 7.5). 4. CVE-2023-39982: Hard-coded credentials in the device enable attackers to decrypt SSH traffic and facilitate man-in-the-middle attacks (CVSS 7.5). 5. CVE-2023-39983: Improper control of object attributes allows attackers to register or add unauthorized devices via the nsm-web application (CVSS 5.3). All vulnerabilities are network-exploitable with no patch available from Moxa.
- Network reachability to the MXsecurity device management interface (default ports: web interface, SSH)
- CVE-2023-39979 and CVE-2023-39981 require no authentication; others require initial access via one of the authentication bypass vulnerabilities
Patching may require device reboot — plan for process interruption
/api/v1/advisories/de4e7e86-64d7-4170-8088-0f6d9e47db7d