Metrics
Affected Vendors & Products
Solution
Moxa has developed appropriate solutions to address vulnerability. The solutions for the affected products are listed below. * EDR-8010 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-8010-series#resources or later * EDR-G9004 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g9004-series#resources or later * EDR-G9010 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g9010-series#resources or later * EDF-G1002-BP Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/network-security-appliance/edf-g1002-bp-series#resources or later * NAT-102 Series: An official patch or firmware update is not currently available for this product. Please refer to the Mitigations section below for recommended measures to address the vulnerability. * OnCell G4302-LTE4 Series: Please contact Moxa Technical Support https://www.moxa.com/support/support/technical-support for the security patch * TN-4900 Series: Please contact Moxa Technical Support https://www.moxa.com/support/support/technical-support for the security patch
Workaround
* Minimize network exposure to ensure the device is not accessible from the Internet. * Limit SSH access to trusted IP addresses and networks using firewall rules or TCP wrappers. * Implement IDS or Intrusion Prevention System (IPS) to detect and prevent exploitation attempts. These systems can provide an additional layer of defense by monitoring network traffic for signs of attacks.
Fri, 03 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 03 Jan 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Moxa’s cellular routers, secure routers, and network security appliances are affected by a critical vulnerability, CVE-2024-9140. This vulnerability allows OS command injection due to improperly restricted commands, potentially enabling attackers to execute arbitrary code. This poses a significant risk to the system’s security and functionality. | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-01-03T14:30:11.567Z
Reserved: 2024-09-24T07:11:44.997Z
Link: CVE-2024-9140

Updated: 2025-01-03T14:30:08.060Z

Status : Received
Published: 2025-01-03T09:15:06.570
Modified: 2025-01-03T09:15:06.570
Link: CVE-2024-9140

No data.

No data.