Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-37407 | TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command injection vulnerability. This vulnerability stems from inadequate input validation in the certificate management function, which could potentially allow malicious users to execute remote code on affected devices. |
Solution
Moxa has developed appropriate solution to address the vulnerability. The solution for affected products is shown below: * TN-4900 Series: Please upgrade to firmware v3.0 or higher. https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/en-50155-routers/tn-5900-series#resources * TN-5900 Series: Please upgrade to firmware v3.4 or higher. https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/en-50155-routers/tn-5900-series#resources * EDR-810 Series: Please upgrade to firmware v5.12.29 or higher. https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-810-series#resources * EDR-G902 Series: Please upgrade to firmware v5.7.21 or higher. https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g902-series * EDR-G903 Series: Please upgrade to firmware v5.7.21 or higher. https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g903-series#resources * EDR-G9010 Series: Please upgrade to firmware v3.0 or higher. https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g9010-series#resources * NAT-102 Series: Please upgrade to firmware v1.0.5 or higher. https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/nat-102-series#resources
Workaround
No workaround given by the vendor.
Mon, 28 Oct 2024 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command injection vulnerability. This vulnerability stems from inadequate input validation in the certificate management function, which could potentially allow malicious users to execute remote code on affected devices. | TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command injection vulnerability. This vulnerability stems from inadequate input validation in the certificate management function, which could potentially allow malicious users to execute remote code on affected devices. |
| Weaknesses | CWE-78 |
Tue, 08 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Moxa edr-810
Moxa edr-g9010 Moxa edr-g902 Moxa nat-102 |
|
| CPEs | cpe:2.3:a:moxa:edr-g9010:*:*:*:*:*:*:*:* cpe:2.3:a:moxa:nat-102:*:*:*:*:*:*:*:* cpe:2.3:h:moxa:edr-810:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:edr-g902:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Moxa edr-810
Moxa edr-g9010 Moxa edr-g902 Moxa nat-102 |
|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2024-10-28T06:03:40.655Z
Reserved: 2023-05-19T02:30:16.483Z
Link: CVE-2023-33238
Updated: 2024-08-02T15:39:35.932Z
Status : Modified
Published: 2023-08-17T03:15:09.377
Modified: 2024-11-21T08:05:12.860
Link: CVE-2023-33238
No data.
OpenCVE Enrichment
No data.
EUVD