Moxa Privilege Escalation and OS Command Injection Vulnerabilities in Cellular Routers, Secure Routers, and Network Security Appliances
Moxa cellular routers, secure routers, and network security appliances contain two critical vulnerabilities: CVE-2024-9138 (hard-coded credentials allowing privilege escalation to root) and CVE-2024-9140 (OS command injection via special character bypass allowing unauthenticated arbitrary code execution). The command injection vulnerability (CVE-2024-9140) is remotely exploitable without authentication and has a CVSS 3.1 score of 9.8. The privilege escalation vulnerability (CVE-2024-9138) requires prior authentication but allows escalation from user to root level. No patch is currently available from Moxa for either vulnerability.
- Network access to the Moxa device (CVE-2024-9140: no authentication required; CVE-2024-9138: any valid authenticated session)
- Ability to send HTTP/CLI requests to the device management interface
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2119bfdd-1d13-4b6c-a8e6-94253a951788Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.