ICS Alert

Vulnerability in MOXA Device Manager

Last Revised
Alert Code
ICS-ALERT-10-293-02

Description

A security researcher has reported a vulnerability in the Moxa Device Manager (MDM).

table.gridtable {
font-family: verdana,arial,sans-serif;
font-size:11px;
color:#333333;
border-width: 1px;
border-color: #666666;
border-collapse: collapse;
}
table.gridtable th {
border-width: 1px;
padding: 8px;
border-style: solid;
border-color: #666666;
background-color: #dedede;
}
table.gridtable td {
border-width: 1px;
padding: 8px;
border-style: solid;
border-color: #666666;
background-color: #ffffff;
}

Summary

A security researcher has reported a vulnerability in the Moxa Device Manager (MDM).

The MDM is a remote management tool for managing Moxa’s embedded computers via the Internet. Moxa’s embedded computers are used in the following applications: Renewable Energy, Power Automation, Maritime, and Railway & ITS.

The reported vulnerability is a buffer overflow in the communications protocol utilized by the MDM Tool. ICS-CERT has not verified this vulnerability.

ICS-CERT is reaching out to Moxa to inform them of this vulnerability and to work with them on any necessary mitigations. ICS-CERT will provide additional information as it becomes available.

Please report any issues affecting control systems in critical infrastructure environments to ICS-CERT.

Other resources:

http://www.reversemode.com/index.php?option=com_content&task=view&id=70&Itemid=5

Followup

ICS-CERT released vulnerability details and mitigation recommendations in the follow-up advisories, MOXA Device Manager Buffer Overflow, on October 28, 2010, and MOXA Device Manager Buffer Overflow (Update A), on November 10, 2010.

This product is provided subject to this Notification and this Privacy & Use policy.

Vendor

Moxa