First published: Fri Apr 01 2022(Updated: )
Five buffer overflows in the built-in web server in Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier may allow a remote attacker to initiate a denial-of-service attack and execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Nport Iaw5150a-6i\/o Firmware | <=2.2 | |
Moxa Nport Iaw5150a-6i\/o | ||
Moxa Nport Iaw5150a-12i\/o Firmware | <=2.2 | |
Moxa Nport Iaw5150a-12i\/o | ||
Moxa Nport Iaw5250a-6i\/o Firmware | <=2.2 | |
Moxa Nport Iaw5250a-6i\/o | ||
Moxa Nport Iaw5250a-12i\/o Firmware | <=2.2 | |
Moxa Nport Iaw5250a-12i\/o | ||
Moxa NPort IAW5000A-I/O Series firmware version 2.2 or earlier |
Moxa has developed solutions to address these vulnerabilities. Please contact Moxa Technical Support for a security patch. Moxa has also published a security advisory to provide more information.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-32976 is critical with a CVSS score of 9.8.
A remote attacker can exploit CVE-2021-32976 by sending specially crafted requests to the built-in web server in Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier.
CVE-2021-32976 may allow a remote attacker to initiate a denial-of-service attack and execute arbitrary code.
Moxa NPort IAW5000A-I/O firmware version 2.2 or earlier is affected by CVE-2021-32976.
To mitigate the vulnerability in Moxa NPort IAW5000A-I/O firmware, users should update to a version later than 2.2.