Moxa VPort 06EC-2V Series IP Cameras Vulnerabilities
Moxa VPort 06EC-2V Series IP Cameras contain multiple vulnerabilities: 1. NULL Pointer Dereference (CVE-2021-25845): The device accepts authentication cookies consisting of only digits, allowing an attacker to brute force the authentication mechanism and bypass login controls to access device functions. 2. Integer Underflow (CVE-2021-25846, CVE-2021-25849): Attackers can craft malicious HTTP requests to cause the device to become unavailable. 3. Out-of-Bounds Read (CVE-2021-25847, CVE-2021-25848): Attackers can modify HTTP request elements to read sensitive information from the device or cause it to crash.
- Network access to the VPort 06EC-2V camera's HTTP interface (typically port 80 or 443)
- No valid credentials required for authentication bypass or denial-of-service attacks
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b1ab2565-1661-4847-9005-69dedf1df37eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.