Moxa Vulnerabilities Identified in MDS-G4028-L3 Series and EDS-G512E - SSH Prefix Truncation, EOL Nginx Software, and Weak SSL/TLS Key Exchange
Moxa MDS-G4028-L3 series and EDS-G512E industrial network devices contain multiple vulnerabilities: (1) CVE-2023-48795 — SSH prefix truncation allows bypass of SSH integrity checks, enabling unauthorized command injection via malformed SSH packets; (2) Outdated Nginx component (versions affected by CVE-2021-23017, CVE-2021-3618, CVE-2019-20372) allowing HTTP request smuggling, cache poisoning, and certificate validation bypass; (3) Weak SSL/TLS key exchange on EDS-G512E enabling brute-force decryption of encrypted management traffic. The SSH and Nginx vulnerabilities can be exploited to inject unauthorized configuration changes or commands, while weak encryption compromises confidentiality of communications. All vulnerabilities are accessible over the network with no authentication required for exploitation in some attack paths.
- Network access to SSH port (22) or HTTPS port (443) on the device
- No authentication required for some attack vectors
- Physical proximity or network routing to reach the device management interfaces
Patching may require device reboot — plan for process interruption
/api/v1/advisories/501ff92f-59df-4fe0-a7d2-273fb040e03aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.