Headline
CVE-2023-33235: MXsecurity Command Injection and Hardcoded Credential Vulnerabilities
MXsecurity version 1.0 is vulnearble to command injection vulnerability. This vulnerability has been reported in the SSH CLI program, which can be exploited by attackers who have gained authorization privileges. The attackers can break out of the restricted shell and subsequently execute arbitrary code.
As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.
Please sign in
SUMMARY
MXsecurity Command Injection and Hardcoded Credential Vulnerabilities
- Security Advisory ID: MPSA-230301
- Version: V1.0
- Release Date: Mar 08, 2023
- Reference:
- ZDI-CAN-19895
- ZDI-CAN-19896
ZDI-CAN-19895
A vulnerability has been reported in the SSH CLI program, which can be exploited by attackers who have gained authorization privileges. The attackers can break out of the restricted shell and subsequently execute arbitrary code.
ZDI-CAN-19896
A vulnerability has been reported that can be exploited to craft arbitrary JWT tokens and subsequently bypass authentication for web-based APIs.
The identified vulnerability types and potential impacts are shown below:
Item
Vulnerability Type
Impact
1
Improper Neutralization of Special Elements Used in a Command (‘Command Injection’) (CWE-77)
ZDI-CAN-19895
An attacker located remotely who has gained authorization privileges can execute arbitrary commands on the device.
2
Use of Hard-coded Credentials (CWE-798)
ZDI-CAN-19896
An attacker may be able to bypass authentication for web-based APIs.
AFFECTED PRODUCTS AND SOLUTIONS
Affected Products:
The affected products and firmware versions are shown below.
Product Series
Affected Versions
MXsecurity Series
Software v1.0
Solutions:
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.
Product Series
Solutions
MXsecurity Series
Please upgrade to software v1.0.1 or higher.
Acknowledgment:
We would like to express our appreciation to Simon Janz (@esj4y) in ZDI for reporting the vulnerability, working with us to help enhance the security of our products, and helping us provide a better service to our customers.
Revision History:
VERSION
DESCRIPTION
RELEASE DATE
1.0
First Release
March 8, 2023
Print this page
You can manage and share your saved list in My Moxa
Let’s get that fixed
If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.
Report a Vulnerability
You have some items waiting in your bag; click here to finish your quote!
Feedback