SB2023090420 - Multiple vulnerabilities in Moxa MXsecurity Series
Published: September 4, 2023 Updated: September 6, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Small Space of Random Values (CVE-ID: CVE-2023-39979)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to small space of random values. A remote attacker can bypass authentication process and gain unauthorized access to the application.
2) SQL injection (CVE-ID: CVE-2023-39980)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
3) Improper Authentication (CVE-ID: CVE-2023-39981)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error in when processing authentication requests. A remote attacker can bypass authentication process and gain access to disclose device information.
4) Use of hard-coded credentials (CVE-ID: CVE-2023-39982)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker can perform a man-in-the-middle (MitM) attack and enable the decryption of SSH traffic.
5) Improperly Controlled Modification of Dynamically-Determined Object Attributes (CVE-ID: CVE-2023-39983)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improperly controlled modification of dynamically-determined object attributes. A remote attacker can register/add a device via the nsm-web application.
Remediation
Install update from vendor's website.