Moxa Security Enhancement: SSL Medium Strength Cipher Suites Supported (SWEET32)
Moxa devices support DES and Triple DES cipher suites in TLS, SSH, and IPSec protocols. These ciphers have a birthday bound of approximately four billion blocks, making it feasible for remote attackers to decrypt long-duration encrypted sessions through a birthday attack, particularly HTTPS sessions using Triple DES in CBC mode (CVE-2016-2183, also known as SWEET32). Moxa has no planned fixes for this issue; users must implement compensating controls such as disabling weak ciphers and restricting network access to management interfaces.
- Network ability to capture encrypted traffic between the Moxa device and connected clients (e.g., man-in-the-middle position or network sniffing)
- Long-duration encrypted session using DES or Triple DES cipher suite (hours or days of continuous encryption)
- Moxa device configured to accept medium-strength ciphers
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d1417c7d-473c-40f1-a6c4-55a1885445a8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.