Moxa VPort 461 Series Industrial Video Servers Vulnerabilities
Low Risk1vport-461-series-industrial-video-servers-vulnerabilitiesJun 8, 2020
Summary
A command injection vulnerability (CVE-2020-23639) exists in Moxa VPort 461 Series Industrial Video Servers. The vulnerability allows a remote attacker to execute arbitrary commands on the affected device. All versions of the VPort 461 are vulnerable. Moxa has not released a patch and has indicated no fix is available.
What this means
What could happen
An attacker could execute arbitrary commands on the VPort 461 video server, potentially compromising the device's operation and using it as a foothold to access other network-connected systems in your plant.
Who's at risk
Manufacturing facilities using Moxa VPort 461 Series Industrial Video Servers for plant surveillance and monitoring. This affects any organization relying on these devices for facility monitoring, process observation, or security camera feeds in industrial environments.
How it could be exploited
An attacker with network access to the device can inject shell commands through an unprotected input field or API endpoint, causing the VPort 461 to execute those commands with the privileges of the web service running on the device.
Prerequisites
- Network access to the VPort 461 web interface or API endpoint
- No authentication required (based on command injection vulnerability class)
remotely exploitableno authentication requiredno patch availableaffects facility visibility systems
Exploitability
Moderate exploit probability (EPSS 6.1%)
Affected products (1)
ProductAffected VersionsFix Status
VPort 461All versionsNo fix (EOL)
Remediation & Mitigation
0/4
Do now
0/2HARDENINGRestrict network access to the VPort 461 to authorized personnel and systems only using firewall rules and network segmentation
HARDENINGMonitor the device for suspicious command execution or unexpected process activity
Long-term hardening
0/2HOTFIXContact Moxa directly to request availability of patched firmware or migration guidance, as no fix is currently available
WORKAROUNDConsider replacing the device with a newer VPort model that includes security patches if long-term support is critical
CVEs (1)
โโ Navigate ยท Esc Close
API:
/api/v1/advisories/9ff9ff65-9431-45b1-973c-844a1db8f4bd