First published: Thu Dec 23 2021(Updated: )
The affected products contain vulnerable firmware, which could allow an attacker to sniff the traffic and decrypt login credential details. This could give an attacker admin rights through the HTTP web server.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Mgate Mb3180 Firmware | <=2.2 | |
MOXA Mgate MB3180 | ||
Moxa Mgate Mb3280 Firmware | <=4.1 | |
Moxa Mgate Mb3280 | ||
Moxa Mgate Mb3480 Firmware | <=3.2 | |
Moxa Mgate Mb3480 | ||
Moxa MGate MB3180 Series: Firmware Version 2.2 or lower | ||
Moxa MGate MB3280 Series: Firmware Version 4.1 or lower | ||
Moxa MGate MB3480 Series: Firmware Version 3.2 or lower |
Moxa has developed the following mitigations to address this vulnerability. Enable ‘HTTPS’ and disable the HTTP console function under ‘Console Settings’ Moxa also recommends users refer to Tech Note: Moxa Security Hardening Guide for MGate MB3000 Series
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4161 is a vulnerability in the affected products' firmware that could allow an attacker to sniff the traffic and decrypt login credential details.
CVE-2021-4161 could give an attacker admin rights through the HTTP web server.
The Moxa Mgate Mb3180 Firmware up to version 2.2, Moxa Mgate Mb3280 Firmware up to version 4.1, and Moxa Mgate Mb3480 Firmware up to version 3.2 are affected.
CVE-2021-4161 has a severity rating of 7.5, which is considered critical.
To mitigate CVE-2021-4161, it is recommended to update the firmware of the affected products to a secure version.
You can find more information about CVE-2021-4161 at the following reference: [link](https://www.cisa.gov/uscert/ics/advisories/icsa-21-357-01).