Moxa AIG-301 Series Azure uAMQP Vulnerabilities

Plan PatchCVSS 9.8MPSA-248041Apr 22, 2024
Moxa
Summary

Moxa AIG-301 Series gateways prior to version 1.5 contain three critical memory safety vulnerabilities in the Azure uAMQP protocol implementation: a double free issue (CVE-2024-27099), use-after-free flaw (CVE-2024-25110), and integer overflow/memory safety issue (CVE-2024-21646). Each can be triggered by a specially crafted AMQP protocol message and lead to remote code execution without authentication or user interaction. All three vulnerabilities have a CVSS score of 9.8.

What this means
What could happen
An attacker can remotely execute arbitrary code on the AIG-301 gateway without authentication, potentially allowing them to manipulate data communications to connected industrial devices or disrupt the gateway's operation entirely.
Who's at risk
Critical for any organization using Moxa AIG-301 Series industrial gateways as an edge device for cloud data collection, telemetry aggregation, or remote device management in manufacturing, utilities, or critical infrastructure environments.
How it could be exploited
An attacker on the network sends a specially crafted Azure uAMQP protocol message to the AIG-301 (port typically 5671 or 5672). The malformed AMQP packet triggers a memory safety issue (double free, use-after-free, or integer overflow) in the AIG-301's uAMQP implementation, allowing arbitrary code execution on the device.
Prerequisites
  • Network access to the AIG-301 on its uAMQP listening port (typically 5671 or 5672)
  • No credentials required
  • No user interaction required
Remotely exploitableNo authentication requiredLow complexity attackNo patch available (as of advisory date)Affects gateway/data aggregation functionalityCVSS 9.8 (critical)
Exploitability
Some exploitation risk — EPSS score 2.6%
Affected products (1)
ProductAffected VersionsFix Status
AIG-301All versions1.5+
Remediation & Mitigation
0/3
Do now
0/3
HOTFIXContact Moxa support for firmware version 1.5 or later availability; install immediately upon release
HARDENINGImplement network segmentation to restrict unauthenticated access to the AIG-301 gateway; allow only known cloud services or trusted subnets to communicate with the device on AMQP ports
WORKAROUNDDisable Azure cloud connectivity on the AIG-301 if not required for operations, or configure firewall rules to block outbound connections to Azure AMQP endpoints
API: /api/v1/advisories/a97a55a2-811a-4a6d-adfd-a67e3a4058d6

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.

Moxa AIG-301 Series Azure uAMQP Vulnerabilities | CVSS 9.8 - OTPulse