Vulnerability in MOXA Device Manager
All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.
A security researcher has reported a vulnerability in the Moxa Device Manager (MDM).
The MDM is a remote management tool for managing Moxa’s embedded computers via the Internet. Moxa’s embedded computers are used in the following applications: Renewable Energy, Power Automation, Maritime, and Railway & ITS.
The reported vulnerability is a buffer overflow in the communications protocol utilized by the MDM Tool. ICS-CERT has not verified this vulnerability.
ICS-CERT is reaching out to Moxa to inform them of this vulnerability and to work with them on any necessary mitigations. ICS-CERT will provide additional information as it becomes available.
Please report any issues affecting control systems in critical infrastructure environments to ICS-CERT.
ICS-CERT released vulnerability details and mitigation recommendations in the follow-up advisories, MOXA Device Manager Buffer Overflow, on October 28, 2010, and MOXA Device Manager Buffer Overflow (Update A), on November 10, 2010.
For any questions related to this report, please contact the NCCIC at:
Toll Free: 1-888-282-0870
The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.