#VU25669 Incorrectly Specified Destination in a Communication Channel in Moxa Hardware solutions


Published: 2020-02-27

Vulnerability identifier: #VU25669

Vulnerability risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-9097

CWE-ID: CWE-941

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Moxa MGate MB3170 Series
Hardware solutions / Routers & switches, VoIP, GSM, etc
Moxa MGate MB3270 Series
Hardware solutions / Routers & switches, VoIP, GSM, etc
Moxa MGate MB3180 Series
Hardware solutions / Routers & switches, VoIP, GSM, etc
Moxa MGate MB3280 Series
Hardware solutions / Routers & switches, VoIP, GSM, etc
Moxa MGate MB3480 Series
Hardware solutions / Routers & switches, VoIP, GSM, etc
Moxa MGate MB3660 Series
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: Moxa

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the affected software creates a communication channel to initiate an outgoing request to an actor, but it does not correctly specify the intended destination for that actor. A remote attacker can overload the system to cause the service to crash, leading to the web service may become temporarily unavailable.


Mitigation
Install updates from vendor's website.

Vulnerable software versions

Moxa MGate MB3170 Series: 1.0 - 4.0

Moxa MGate MB3270 Series: 1.0 - 4.0

Moxa MGate MB3180 Series: 1.0 - 2.0

Moxa MGate MB3280 Series: 1.0 - 3.0

Moxa MGate MB3480 Series: 1.0 - 3.0

Moxa MGate MB3660 Series: 1.0 - 2.2


External links
http://ics-cert.us-cert.gov/advisories/icsa-20-056-01
http://www.moxa.com/en/support/support/security-advisory/mb3710-3180-3270-3280-3480-3660-vulnerabilities


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability