Headline
CVE-2023-4452: EDR-810/G902/G903 Series Web Server Buffer Overflow Vulnerability
A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot.
As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.
Please sign in
SUMMARY
EDR-810/G902/G903 Series Web Server Buffer Overflow Vulnerability
- Security Advisory ID: MPSA-234880
- Version: V1.0
- Release Date: Nov 01, 2023
- Reference:
- CVE-2023-4452 (cve.org)
A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot.
The identified vulnerability types and potential impacts are shown below:
Item
Vulnerability Type
Impact
1
Buffer Copy Without Checking Size of Input (CWE-120)
CVE-2023-4452
An attacker can trigger the device reboot.
Vulnerability Scoring Details
ID
CVSS V3.1
VECTOR
REMOTE EXPLOIT WITHOUT AUTH?
CVE-2023-4452
6.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Yes
AFFECTED PRODUCTS AND SOLUTIONS
Affected Products:
The affected products and firmware versions are shown below.
Product Series
Affected Versions
EDR-810 Series
Firmware version v5.12.28 and prior versions
EDR G902 Series
Firmware version v5.7.20 and prior versions
EDR G903 Series
Firmware version v5.7.20 and prior versions
Solutions:
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.
****Mitigation****
Minimize network exposure to ensure the device is not accessible from the Internet.
When remote access is required, use secure methods, such as Virtual Private Networks (VPNs).
The starting point of all the above vulnerabilities is from the web service, so it is suggested to disable web service temporarily if you have completed the configuration to prevent further damages from these vulnerabilities until installing the patch or updating the firmware.
Products That Are Not Vulnerable:
Only the products listed in the Affected Products section of this advisory are known to be affected by this vulnerability. Moxa has confirmed that this vulnerability does not affect the following products:
EDR-8010 Series, EDR-G9010 Series
NAT-102 Series
TN-5500A Series, TN-4500A Series, TN-G4500 Series, TN-G6500 Series
TN-4900 Series, TN-5900 Series, TN-5900-ETBN Series
AWK-3131A Series, AWK-3131A-RCC Series, AWK-3131A-RTG Series
TAP-213 Series, TAP-323 Series
WAC-1001 Series, WAC-2004A Series
VPort 06-2 Series, VPort 06EC-2V Series, VPort 461A Series, VPort 464 Series, VPort P06-1MP-M12 Series, VPort P06HC-1V Series, VPort P16-1MP-M12 Series, VPort P16-1MP-M12-IR Series, VPort P16-2MR Series
Acknowledgment:
We would like to express our appreciation to Zhiyuan Chen for reporting the vulnerability, working with us to help enhance the security of our products, and helping us provide a better service to our customers.
Revision History:
VERSION
DESCRIPTION
RELEASE DATE
1.0
First Release
Nov 1, 2023
Relevant Products
EDR-810 Series · EDR-G902 Series · EDR-G903 Series ·
Print this page
You can manage and share your saved list in My Moxa
Related Advisories
- Multiple Routers Improper Input Validation Vulnerabilities
- TN-5900 and TN-4900 Series Web Server Multiple Vulnerabilities
- Secure Router EDR and TN Series Improper Input Validation Vulnerabilities
- Secure Router EDR and TN Series Improper Input Validation Vulnerabilities
- EDR-G903, EDR-G902, and EDR-810 Series Secure Routers Vulnerability
Let’s get that fixed
If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.
Report a Vulnerability