The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary code.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-49752 The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary code.
Fixes

Solution

Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for the affected products are shown below. * EDR-8010 Series: Upgrade to the firmware version 3.13 or later version. * EDR-G9004 Series: Upgrade to the firmware version 3.13 or later version. * EDR-G9010 Series: Upgrade to the firmware version 3.13 or later version. * EDF-G1002-BP Series: Upgrade to the firmware version 3.13 or later version. * NAT-102 Series: Please contact Moxa Technical Support for the security patch. * OnCell G4302-LTE4 Series: Upgrade to the firmware version 3.13 or later version. * TN-4900 Series: Upgrade to the firmware version 3.13 or later version. * EDR-810 Series: Upgrade to the firmware version 5.12.37 or later version.


Workaround

* Minimize network exposure to ensure the device is not accessible from the Internet. * Limit web access to trusted IP addresses and networks by using firewall rules or TCP wrappers. * Implement IDS or Intrusion Prevention System (IPS) to detect and prevent exploitation attempts. These systems can provide an additional layer of defense by monitoring network traffic for signs of attacks.

History

Wed, 06 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Moxa edf-g1002-bp Firmware
Moxa edr-8010 Firmware
Moxa edr-810 Firmware
Moxa edr-g9004 Firmware
Moxa edr-g9010 Firmware
Moxa nat-102 Firmware
Moxa oncell G4302-lte4 Firmware
Moxa tn-4900 Firmware
CPEs cpe:2.3:a:moxa:edf-g1002-bp:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:edr-8010:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:edr-g9004:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:edr-g9010:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:nat-102:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:oncell_g4302-lte4:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:tn-4900:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:edf-g1002-bp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:edr-8010_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:edr-810_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:edr-g9004_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:edr-g9010_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:nat-102_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:oncell_g4302-lte4_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:tn-4900_firmware:*:*:*:*:*:*:*:*
Vendors & Products Moxa edf-g1002-bp
Moxa edr-8010
Moxa edr-g9004
Moxa edr-g9010
Moxa nat-102
Moxa oncell G4302-lte4
Moxa tn-4900
Moxa edf-g1002-bp Firmware
Moxa edr-8010 Firmware
Moxa edr-810 Firmware
Moxa edr-g9004 Firmware
Moxa edr-g9010 Firmware
Moxa nat-102 Firmware
Moxa oncell G4302-lte4 Firmware
Moxa tn-4900 Firmware

Tue, 15 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Moxa
Moxa edf-g1002-bp
Moxa edr-8010
Moxa edr-g9004
Moxa edr-g9010
Moxa nat-102
Moxa oncell G4302-lte4
Moxa tn-4900
CPEs cpe:2.3:a:moxa:edf-g1002-bp:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:edr-8010:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:edr-g9004:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:edr-g9010:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:nat-102:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:oncell_g4302-lte4:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:tn-4900:*:*:*:*:*:*:*:*
Vendors & Products Moxa
Moxa edf-g1002-bp
Moxa edr-8010
Moxa edr-g9004
Moxa edr-g9010
Moxa nat-102
Moxa oncell G4302-lte4
Moxa tn-4900
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 14 Oct 2024 08:45:00 +0000

Type Values Removed Values Added
Description The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary code.
Title OS Command Injection in Restricted Command
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Moxa

Published:

Updated: 2024-11-06T20:47:06.342Z

Reserved: 2024-09-24T07:11:43.318Z

Link: CVE-2024-9139

cve-icon Vulnrichment

Updated: 2024-10-15T14:30:07.315Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-14T09:15:04.693

Modified: 2024-10-15T12:57:46.880

Link: CVE-2024-9139

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.