Moxa NPort 6000 Series and Utility Improper Certificate Validation Vulnerabilities
Two improper certificate validation vulnerabilities exist in the Moxa NPort 6000 Series and its Windows driver manager software (CVE-2022-43993, CVE-2022-43994). The Windows driver manager does not perform server certificate verification. The NPort 6000 device does not perform client certificate authentication. An attacker positioned between the Windows driver manager and the NPort 6000 on the network can perform a person-in-the-middle attack to eavesdrop on the secure connection and potentially read sensitive management traffic including credentials, device configuration, and serial port data.
- Network access to the path between Windows driver manager workstation and NPort 6000 device
- Ability to position self as man-in-the-middle (same network segment, DNS/ARP control, or network access point)
- Device must be actively communicating with Windows driver manager software
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fb73c028-3f9e-439a-bd97-7501a6ee5a27Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.