Moxa Multiple Moxa Product Series Affected by CVE-2024-6387
Moxa uct devices are affected by CVE-2024-6387, a remote code execution vulnerability in OpenSSH. A race condition in the OpenSSH server's SIGALRM signal handler allows unauthenticated attackers to execute arbitrary code with root privileges. The vulnerability occurs when an SSH client fails to authenticate within the LoginGraceTime period (default 120 seconds). The signal handler calls unsafe functions like syslog() in an asynchronous context, which can be exploited to achieve code execution. No firmware patch is available for affected Moxa uct devices.
- Network access to SSH port 22 on the Moxa uct device
- Ability to trigger failed SSH authentication within LoginGraceTime window (default 120 seconds)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a6f869a4-0643-4897-b3ed-fa10608c0a91Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.