Moxa SDS-3008 Series Multiple Web Vulnerabilities
The Moxa SDS-3008 Series Industrial Ethernet switch web server contains four vulnerability classes affecting v2.1: (1) Cleartext transmission of credentials and sensitive data via network sniffing (CVE-2022-40693); (2) Denial-of-service via malformed HTTP message headers that exhaust server resources (CVE-2022-40224); (3) Stored cross-site scripting allowing arbitrary JavaScript injection and execution in engineer browsers (CVE-2022-41311, CVE-2022-41312, CVE-2022-41313); (4) Information disclosure via crafted HTTP requests revealing system details (CVE-2022-40691). All versions of the SDS-3008 are affected. No firmware patch has been released by Moxa.
- Network access to the SDS-3008 web management port (typically port 80/443)
- No authentication required for some information disclosure vulnerabilities
- For stored XSS, attacker needs ability to send HTTP requests to the switch
- For sniffing attacks, attacker must be on a network segment that can see switch traffic
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8406cdc7-7e35-42ae-8ad3-cdfe3278178bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.