Summary
Multiple issues have been found in the affected products. See CVE descriptions for details.
Impact
These vulnerabilities may allow an attacker to DoS affected devices or access sensitive information or gain administrative access. See vulnerability descriptions for details.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
1504460000 | IE-GW-MB-2TX-1RS232/485 | Firmware V1.0 (Build 14050818) |
1504470000 | IE-GWT-MB-2TX-1RS232/485 | Firmware V1.0 (Build 14050818) |
Vulnerabilities
Expand / Collapse allAn issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A Buffer overflow in the built-in web server allows remote attackers to initiate DoS, and probably to execute arbitrary code (issue 1 of 2).
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An attacker may be able to intercept weakly encrypted passwords and gain administrative access.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. Insufficient password requirements for the MGate web application may allow an attacker to gain access by brute-forcing account passwords.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A predictable mechanism of generating tokens allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An Integer overflow in the built-in web server allows remote attackers to initiate DoS.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. Sensitive information is sent to the web server in cleartext, which may allow an attacker to discover the credentials if they are able to observe traffic between the web browser and the server.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. The application's configuration file contains parameters that represent passwords in cleartext.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An attacker can access sensitive information (e.g., conduct username disclosure attacks) on the built-in WEB-service without authorization.
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A high rate of transit traffic may cause a low-memory condition and a denial of service.
Remediation
For all potential vulnerabilities, customers can download a patched firmware to secure their Modbus TCP/RTU Gateways properly.
Please download and install the latest firmware for your device by following the procedure below:
- Go to www.weidmueller.com (external link).
- Enter the product number of the Modbus TCP/RTU Gateway you want to update into the search field and press "Enter".
- On the next page, expand the drop-down menu "SHOW DOWNLOADS".
- Download the respective firmware from the download table.
- Install the firmware on your device.
Find below the appropriate patched firmware versions for all affected products:
Product number | Product name | Patched firmware version |
---|---|---|
1504460000 | IE-GW-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |
1504470000 | IE-GWT-MB-2TX-1RS232/485 | V2.1 (Build 21072817) |
Revision History
Version | Date | Summary |
---|---|---|
1 | 04/07/2022 08:00 | Initial revision. |