Moxa TN-5900 Series Affected by Multiple OpenSSL Vulnerabilities
Multiple OpenSSL vulnerabilities (CVE-2022-4304, CVE-2023-0215, CVE-2023-0286) affect Moxa TN-5900 Series devices. These include: (1) a timing-based side-channel attack allowing recovery of the pre-master secret and decryption of encrypted management traffic; (2) a use-after-free vulnerability in SSL BIO handling that can crash the device; (3) a type confusion vulnerability enabling arbitrary memory reads or denial of service attacks. All three vulnerabilities require only network access to the device's SSL/TLS port and no authentication. The TN-5900 will not receive patches from Moxa.
- Network access to the TN-5900 SSL/TLS service (typically port 443 or port 61682 for Moxa management)
- No authentication required for CVE-2023-0215 or CVE-2023-0286 exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f27a387e-6926-47b5-86ab-bcc0eea8c667Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.