First published: Fri Feb 18 2022(Updated: )
Moxa TN-5900 v3.1 series routers, MGate 5109 v2.2 series protocol gateways, and MGate 5101-PBM-MN v2.1 series protocol gateways were discovered to contain a memory leak which allows attackers to cause a Denial of Service (DoS) via crafted packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Tn-5916-wv-t Firmware | <=3.1 | |
Moxa Tn-5916-wv-t | ||
Moxa Tn-5916-wv-ct-t Firmware | <=3.1 | |
Moxa Tn-5916-wv-ct-t | ||
Moxa Mgate 5109 Firmware | <=2.2 | |
Moxa Mgate 5109 | ||
Moxa Mgate 5109-t Firmware | <=2.2 | |
Moxa Mgate 5109-t | ||
Moxa Mgate 5101-pbm-mn Firmware | <=2.1 | |
Moxa Mgate 5101-pbm-mn | ||
Moxa Mgate 5101-pbm-mn-t Firmware | <=2.1 | |
Moxa Mgate 5101-pbm-mn-t |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46082 is a vulnerability found in Moxa TN-5900 v3.1 series routers, MGate 5109 v2.2 series protocol gateways, and MGate 5101-PBM-MN v2.1 series protocol gateways.
The severity of CVE-2021-46082 is high, with a CVSS score of 7.5.
CVE-2021-46082 can be exploited by attackers sending crafted packets that trigger a memory leak, leading to a Denial of Service (DoS) condition.
CVE-2021-46082 affects Moxa TN-5900 routers with firmware versions up to and including 3.1, MGate 5109 protocol gateways with firmware versions up to and including 2.2, and MGate 5101-PBM-MN protocol gateways with firmware versions up to and including 2.1.
To fix CVE-2021-46082, it is recommended to update to the latest firmware version provided by Moxa.