CVE-2020-27150
📋 TL;DR
This vulnerability in Moxa NPort IA5000A Series serial device servers exposes all user passwords and sensitive data when exporting device configuration if a pre-shared key is not set. Attackers can obtain administrative credentials and compromise the entire device. Organizations using these devices in industrial control systems are affected.
💻 Affected Systems
- Moxa NPort IA5000A Series Serial Device Servers
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device takeover, credential theft enabling lateral movement in industrial networks, potential disruption of critical industrial processes.
Likely Case
Unauthorized access to device configuration, credential harvesting, potential device manipulation or data exfiltration.
If Mitigated
Limited to configuration data exposure if proper network segmentation and access controls are implemented.
🎯 Exploit Status
Requires access to export configuration feature, but no authentication bypass needed if legitimate access exists.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware version 1.7
Vendor Advisory: https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities
Restart Required: Yes
Instructions:
1. Download firmware version 1.7 from Moxa website. 2. Backup current configuration. 3. Upload and install new firmware via web interface. 4. Reboot device. 5. Restore configuration if needed.
🔧 Temporary Workarounds
Configure Pre-shared Key
allSet a pre-shared key before exporting any device configuration to prevent password exposure.
Restrict Configuration Export Access
allLimit access to configuration export functionality to authorized administrators only.
🧯 If You Can't Patch
- Configure strong pre-shared key on all devices before any configuration export
- Implement strict network segmentation to isolate NPort devices from untrusted networks
🔍 How to Verify
Check if Vulnerable:
Check if firmware version is below 1.7 and test configuration export without pre-shared key set.
Check Version:
Check via web interface: System > System Information > Firmware Version
Verify Fix Applied:
Verify firmware version is 1.7 or higher and confirm configuration export no longer contains plaintext passwords.
📡 Detection & Monitoring
Log Indicators:
- Multiple configuration export attempts
- Unauthorized access to configuration management
Network Indicators:
- Unusual configuration file transfers from NPort devices
- Traffic to/from NPort web interface from unexpected sources
SIEM Query:
source="nport" AND (event="config_export" OR url_path="/config_export")
🔗 References
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2021/05/11/klcert-20-019%2C
- https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2021/05/11/klcert-20-019%2C
- https://www.moxa.com/en/support/product-support/security-advisory/nport-ia5000a-serial-device-servers-vulnerabilities