Headline
CVE-2021-46082: MGate 5109 and MGate 5101-PBM-MN Series Protocol Gateways Vulnerability
Moxa TN-5900 v3.1 series routers, MGate 5109 v2.2 series protocol gateways, and MGate 5101-PBM-MN v2.1 series protocol gateways were discovered to contain a memory leak which allows attackers to cause a Denial of Service (DoS) via crafted packets.
Please sign in
SUMMARY
MGate 5109 and MGate 5101-PBM-MN Series Protocol Gateways Vulnerability
- Version: V1.0
- Release Date: Dec 28, 2021
- Reference:
- N/A
A product vulnerability was identified in Moxa’s MGate 5109 and MGate 5101-PBM-MN Series Protocol Gateways. In response to this, Moxa has developed related solutions to address this vulnerability.
The identified vulnerability types and potential impacts are shown below:
Item
Vulnerability Type
Impact
1
Memory Leak
Continuously sending crafted packets may cause an affected device to experience a memory leak and fail to release memory when it is no longer required.
AFFECTED PRODUCTS AND SOLUTIONS
Affected Products:
The affected products and firmware versions are shown below.
Product Series
Affected Versions
MGate 5109 Series Protocol Gateway
Firmware Version 2.2 or lower.
MGate 5101-PBM-MN Series Protocol Gateway
Firmware Version 2.1 or lower.
Solutions:
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.
Product Series
Solutions
MGate 5109 Series Protocol Gateway
Please upgrade to firmware version 2.3 or higher.(Download)
MGate 5101-PBM-MN Series Protocol Gateway
Please upgrade to firmware version 2.2 or higher. (Download)
Acknowledgment:
We would like to express our appreciation to Qian Chen from the Codesafe Team of Legendsec at Qi’anxin Group for reporting the vulnerability, working with us to help enhance the security of our products, and helping us provide a better service to our customers.
Revision History:
VERSION
DESCRIPTION
RELEASE DATE
1.0
First Release
Dec 28, 2021
Relevant Products
MGate 5101-PBM-MN Series · MGate 5109 Series ·
Print this page
You can manage and share your saved list in My Moxa
Related Advisories
- MGate MB3000 Series, MGate 5100 Series, and MGate W5000 Series Protocol Gateway Vulnerabilities
- Moxa’s Response Regarding SSLv2 Vulnerabilities (DROWN, CVE-2016-0800)
- Moxa’s Response Regarding the GNU Glibc Gethostbyname Function Buffer Overflow Vulnerability (GHOST, CVE-2015-0235)
Let’s get that fixed
If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.
Report a Vulnerability