Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-4929: NPort 5000 Series Firmware Improper Validation of Integrity Check Vulnerability

All firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices.

CVE
#vulnerability

Affected Products:

The affected products and firmware versions are shown below.

Product Series

Affected Versions

NPort 5000AI-M12 Series

Firmware version 1.5 and prior.

NPort 5100 Series (NPort 5130/5150 models)

Firmware version 3.10 and prior.

NPort 5100 Series (NPort 5110 models)

Firmware version 2.10 and prior.

NPort 5100A Series

Firmware version 1.6 and prior.

NPort 5200 Series

Firmware version 2.12 and prior.

NPort 5200A Series

Firmware version 1.6 and prior.

NPort 5410/5430 (Rev. 3.2 and later) and NPort 5450 (all Rev.)

Firmware version 3.14 and prior.

NPort 5410/5430 (Rev 2.x and prior)

Firmware version 2.9 and prior.

NPort 5600 Series

Firmware version 3.11 and prior.

NPort 5600-DT Series

Firmware version 2.9 and prior.

NPort IA5000 Series (hardware version 2.0 and later)

Firmware version 2.1 and prior.

NPort IA5000 Series (hardware version 1.x)

Firmware version 1.7 and prior.

NPort IA5000A Series (NPort IA5450A Series)

Firmware version 2.0 and prior.

NPort IA5000A Series (NPort IA5150A/IA5250A Series)

Firmware version 1.5 and prior.

NPort IA5000A-I/O Series

Firmware version 2.0 and prior.

NPort IAW5000A-I/O Series

Firmware version 2.2 and prior.

NPort P5150A Series

Firmware version 1.6 and prior.

Mitigation:

Due to design restrictions, we could not fix this vulnerability in NPort 5000 Series. We suggest users follow the instructions in the hardening guide in order to mitigate this vulnerability. Additionally, refer to the following mitigation measures to deploy the product in an appropriate product security context.

Moxa recommends users follow these CISA recommendations. Users should

  1. Reduce network exposure by ensuring that all control system devices and systems are not accessible from the Internet.
  1. Place control system networks and remote devices behind firewalls, isolating them from business networks.
  1. When remote access is necessary, employ secure methods such as Virtual Private Networks (VPNs). It is important to note that VPNs may have vulnerabilities and should be kept up to date with the latest available version. Remember that the security of a VPN depends on the security of its connected devices.

Acknowledgment:

We would like to express our appreciation to NETEL (Network Equipment Test and Security Evaluation Laboratory), Sharif University of Technology, Iran, for reporting the vulnerability, working with us to help enhance the security of our products, and helping us provide a better service to our customers.

Revision History:

VERSION

DESCRIPTION

RELEASE DATE

1.0

First Release

Oct 3, 2023

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda