Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-38311 | TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation in the certificate-generation function, which could potentially allow malicious users to execute remote code on affected devices. |
Solution
Moxa has developed appropriate solution to address the vulnerability. The solution for affected products is shown below: * * TN-4900 Series: Please upgrade to firmware v3.0 or higher. https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/en-50155-routers/tn-5900-series#resources * TN-5900 Series: Please upgrade to firmware v3.4 or higher. https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/en-50155-routers/tn-5900-series#resources * EDR-810 Series: Please upgrade to firmware v5.12.29 or higher. https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-810-series#resources * EDR-G902 Series: Please upgrade to firmware v5.7.21 or higher. https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g902-series * EDR-G903 Series: Please upgrade to firmware v5.7.21 or higher. https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g903-series#resources
Workaround
No workaround given by the vendor.
Mon, 28 Oct 2024 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation in the certificate-generation function, which could potentially allow malicious users to execute remote code on affected devices. | TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation in the certificate-generation function, which could potentially allow malicious users to execute remote code on affected devices. |
Weaknesses | CWE-78 |
Tue, 08 Oct 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Moxa edr-810
Moxa edr-g902 Moxa edr-g903 |
|
CPEs | cpe:2.3:h:moxa:edr-810:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:edr-g902:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Moxa edr-810
Moxa edr-g902 Moxa edr-g903 |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2024-10-28T06:07:21.645Z
Reserved: 2023-05-31T08:58:06.149Z
Link: CVE-2023-34214

Updated: 2024-08-02T16:01:54.270Z

Status : Modified
Published: 2023-08-17T03:15:09.747
Modified: 2024-11-21T08:06:47.010
Link: CVE-2023-34214

No data.

No data.