CVE-2018-18393
📋 TL;DR
CVE-2018-18393 is a critical password management vulnerability in Moxa ThingsPro IIoT Gateway and Device Management Software that allows attackers to bypass authentication and gain administrative access. This affects industrial control systems using Moxa's ThingsPro version 2.1 software. Attackers can exploit this to take complete control of IIoT gateways and management systems.
💻 Affected Systems
- Moxa ThingsPro IIoT Gateway
- Moxa ThingsPro Device Management Software
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of IIoT infrastructure, allowing attackers to manipulate industrial processes, steal sensitive operational data, or disrupt critical industrial operations.
Likely Case
Unauthorized administrative access to IIoT gateways leading to data exfiltration, configuration changes, or lateral movement within industrial networks.
If Mitigated
Limited impact if systems are air-gapped, have strict network segmentation, and use additional authentication layers.
🎯 Exploit Status
The vulnerability allows authentication bypass, making exploitation straightforward once the weakness is understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 2.2 or later
Restart Required: Yes
Instructions:
1. Download ThingsPro version 2.2 or later from Moxa's official website. 2. Backup current configuration. 3. Apply the update following Moxa's upgrade guide. 4. Restart the system. 5. Verify the update was successful.
🔧 Temporary Workarounds
Network Isolation
allIsolate affected systems from untrusted networks and implement strict firewall rules.
Access Control Lists
allImplement strict network ACLs to limit access to ThingsPro management interfaces.
🧯 If You Can't Patch
- Implement network segmentation to isolate affected systems from critical infrastructure
- Deploy additional authentication mechanisms and monitor for unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check the ThingsPro software version via the web interface or SSH. If version is 2.1, the system is vulnerable.
Check Version:
ssh admin@<ip> 'cat /etc/thingspro/version' or check via web interface at https://<ip>:8443
Verify Fix Applied:
Verify the software version is 2.2 or later and test authentication mechanisms.
📡 Detection & Monitoring
Log Indicators:
- Failed authentication attempts followed by successful access
- Unusual administrative activity from unexpected IP addresses
- Configuration changes without proper authorization
Network Indicators:
- Unauthorized access to ThingsPro management ports (8443/TCP)
- Traffic patterns indicating authentication bypass
SIEM Query:
source="thingspro" AND (event_type="auth" AND result="success" AND user="admin" AND src_ip NOT IN [allowed_ips])
🔗 References
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/10/18/klcert-18-021-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-password-management-issue/
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/10/18/klcert-18-021-moxa-thingspro-iiot-gateway-and-device-management-software-solutions-password-management-issue/