First published: Fri Apr 01 2022(Updated: )
Improper input validation in the built-in web server in Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier may allow a remote attacker to execute commands.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Nport Iaw5150a-6i\/o Firmware | <=2.2 | |
Moxa Nport Iaw5150a-6i\/o | ||
Moxa Nport Iaw5150a-12i\/o Firmware | <=2.2 | |
Moxa Nport Iaw5150a-12i\/o | ||
Moxa Nport Iaw5250a-6i\/o Firmware | <=2.2 | |
Moxa Nport Iaw5250a-6i\/o | ||
Moxa Nport Iaw5250a-12i\/o Firmware | <=2.2 | |
Moxa Nport Iaw5250a-12i\/o | ||
Moxa NPort IAW5000A-I/O Series firmware version 2.2 or earlier |
Moxa has developed solutions to address these vulnerabilities. Please contact Moxa Technical Support for a security patch. Moxa has also published a security advisory to provide more information.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-32974.
The severity of CVE-2021-32974 is critical with a CVSS score of 9.8.
The affected software for CVE-2021-32974 is Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier.
A remote attacker can exploit CVE-2021-32974 by sending malicious input to the built-in web server, which may allow them to execute commands.
Yes, users should update to a version of the Moxa NPort IAW5000A-I/O series firmware that is later than version 2.2 to mitigate the vulnerability.