First published: Thu Aug 17 2023(Updated: )
TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the certification-generation function, which could potentially allow malicious users to execute remote code on affected devices.
Credit: psirt@moxa.com psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Tn-5900 Firmware | <=3.3 | |
Moxa TN-5900 | ||
All of | ||
Moxa Tn-5900 Firmware | <=3.3 | |
Moxa TN-5900 |
Moxa has developed appropriate solution to address the vulnerability. The solution for affected products is shown below. * TN-5900 Series: Please upgrade to firmware v3.4 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Vulnerability CVE-2023-34215 is a command-injection vulnerability in the TN-5900 Series firmware versions v3.3 and prior.
Vulnerability CVE-2023-34215 has a severity rating of 9.8 (critical).
The affected software for vulnerability CVE-2023-34215 is the Moxa TN-5900 firmware versions up to and including v3.3.
The CWE IDs associated with vulnerability CVE-2023-34215 are 20 (Improper Input Validation) and 77 (Improper Neutralization of Special Elements used in a Command).
To fix vulnerability CVE-2023-34215, it is recommended to update the TN-5900 Series firmware to a version above v3.3 that addresses the command-injection vulnerability.