Description
MOMA Seismic Station Version v2.4.2520 and prior exposes its web management interface without requiring authentication, which could allow an unauthenticated attacker to modify configuration settings, acquire device data or remotely reset the device.
Published: 2026-02-03
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote configuration manipulation
Action: Contact Vendor
AI Analysis

Impact

The vulnerability allows an attacker who can reach the web management interface of MOMA Seismic Station to perform actions without authenticating. An unauthenticated user can alter configuration settings, retrieve device data, or reset the device remotely, potentially disrupting monitoring operations and compromising the integrity of seismic data. The weakness is a missing authentication check, identified as CWE-306.

Affected Systems

Vendors affected are RISS SRL, product MOMA Seismic Station, specifically versions v2.4.2520 and all earlier releases.

Risk and Exploitability

The CVSS base score of 9.3 indicates critical severity, yet the EPSS score of less than 1% suggests that, at present, exploitation attempts are rare. The vulnerability is not cataloged in CISA’s KEV list. Likely attack vector is an unauthenticated network attacker accessing the web interface, which may require that the device is reachable from the attacker’s network or that the victim’s internal network is compromised. Bypassing authentication provides full control over the station’s configuration and operations, and thus poses a high risk to the availability and integrity of seismic monitoring services.

Generated by OpenCVE AI on April 17, 2026 at 23:58 UTC.

Remediation

Vendor Workaround

RISS SRL did not respond to CISA's request for coordination. Users of RISS MOMA Seismic Station are encouraged to contact RISS SRL (info@riss-srl.com) for more information.


OpenCVE Recommended Actions

  • Contact RISS SRL to obtain and install a firmware update that implements authentication on the web management interface.
  • Restrict external network access to the web interface by configuring firewalls or VLAN segmentation to allow only trusted IP addresses.
  • Enable or enforce internal network access controls to ensure that only authorized administrative users can reach the MOMA interface.
  • Monitor configuration files and device logs for unauthorized changes or reset attempts to detect exploitation early.

Generated by OpenCVE AI on April 17, 2026 at 23:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Riss Srl
Riss Srl moma Seismic Station
Vendors & Products Riss Srl
Riss Srl moma Seismic Station

Tue, 03 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description MOMA Seismic Station Version v2.4.2520 and prior exposes its web management interface without requiring authentication, which could allow an unauthenticated attacker to modify configuration settings, acquire device data or remotely reset the device.
Title RISS SRL MOMA Seismic Station Missing Authentication for Critical Function
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Riss Srl Moma Seismic Station
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-02-04T20:17:57.156Z

Reserved: 2026-01-29T16:00:44.404Z

Link: CVE-2026-1632

cve-icon Vulnrichment

Updated: 2026-02-04T20:17:53.757Z

cve-icon NVD

Status : Deferred

Published: 2026-02-03T23:16:06.457

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1632

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:00:09Z

Weaknesses