Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-49752 | The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary code. |
Solution
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for the affected products are shown below. * EDR-8010 Series: Upgrade to the firmware version 3.13 or later version. * EDR-G9004 Series: Upgrade to the firmware version 3.13 or later version. * EDR-G9010 Series: Upgrade to the firmware version 3.13 or later version. * EDF-G1002-BP Series: Upgrade to the firmware version 3.13 or later version. * NAT-102 Series: Please contact Moxa Technical Support for the security patch. * OnCell G4302-LTE4 Series: Upgrade to the firmware version 3.13 or later version. * TN-4900 Series: Upgrade to the firmware version 3.13 or later version. * EDR-810 Series: Upgrade to the firmware version 5.12.37 or later version.
Workaround
* Minimize network exposure to ensure the device is not accessible from the Internet. * Limit web access to trusted IP addresses and networks by using firewall rules or TCP wrappers. * Implement IDS or Intrusion Prevention System (IPS) to detect and prevent exploitation attempts. These systems can provide an additional layer of defense by monitoring network traffic for signs of attacks.
Wed, 06 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Moxa edf-g1002-bp Firmware
Moxa edr-8010 Firmware Moxa edr-810 Firmware Moxa edr-g9004 Firmware Moxa edr-g9010 Firmware Moxa nat-102 Firmware Moxa oncell G4302-lte4 Firmware Moxa tn-4900 Firmware |
|
CPEs | cpe:2.3:a:moxa:edr-8010:*:*:*:*:*:*:*:* cpe:2.3:a:moxa:edr-g9004:*:*:*:*:*:*:*:* cpe:2.3:a:moxa:edr-g9010:*:*:*:*:*:*:*:* cpe:2.3:a:moxa:nat-102:*:*:*:*:*:*:*:* cpe:2.3:a:moxa:oncell_g4302-lte4:*:*:*:*:*:*:*:* cpe:2.3:a:moxa:tn-4900:*:*:*:*:*:*:*:* |
cpe:2.3:o:moxa:edf-g1002-bp_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:edr-8010_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:edr-810_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:edr-g9004_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:edr-g9010_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:nat-102_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:oncell_g4302-lte4_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:tn-4900_firmware:*:*:*:*:*:*:*:* |
Vendors & Products |
Moxa edf-g1002-bp
Moxa edr-8010 Moxa edr-g9004 Moxa edr-g9010 Moxa nat-102 Moxa oncell G4302-lte4 Moxa tn-4900 |
Moxa edf-g1002-bp Firmware
Moxa edr-8010 Firmware Moxa edr-810 Firmware Moxa edr-g9004 Firmware Moxa edr-g9010 Firmware Moxa nat-102 Firmware Moxa oncell G4302-lte4 Firmware Moxa tn-4900 Firmware |
Tue, 15 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Moxa
Moxa edf-g1002-bp Moxa edr-8010 Moxa edr-g9004 Moxa edr-g9010 Moxa nat-102 Moxa oncell G4302-lte4 Moxa tn-4900 |
|
CPEs | cpe:2.3:a:moxa:edf-g1002-bp:*:*:*:*:*:*:*:* cpe:2.3:a:moxa:edr-8010:*:*:*:*:*:*:*:* cpe:2.3:a:moxa:edr-g9004:*:*:*:*:*:*:*:* cpe:2.3:a:moxa:edr-g9010:*:*:*:*:*:*:*:* cpe:2.3:a:moxa:nat-102:*:*:*:*:*:*:*:* cpe:2.3:a:moxa:oncell_g4302-lte4:*:*:*:*:*:*:*:* cpe:2.3:a:moxa:tn-4900:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Moxa
Moxa edf-g1002-bp Moxa edr-8010 Moxa edr-g9004 Moxa edr-g9010 Moxa nat-102 Moxa oncell G4302-lte4 Moxa tn-4900 |
|
Metrics |
ssvc
|
Mon, 14 Oct 2024 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary code. | |
Title | OS Command Injection in Restricted Command | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2024-11-06T20:47:06.342Z
Reserved: 2024-09-24T07:11:43.318Z
Link: CVE-2024-9139

Updated: 2024-10-15T14:30:07.315Z

Status : Awaiting Analysis
Published: 2024-10-14T09:15:04.693
Modified: 2024-10-15T12:57:46.880
Link: CVE-2024-9139

No data.

No data.