CVE-2021-33823
📋 TL;DR
CVE-2021-33823 is a denial-of-service vulnerability in MOXA Mgate MB3180 gateways where attackers can exhaust web service resources by flooding TCP SYN packets. This affects industrial control systems using these specific protocol gateways, potentially disrupting operational technology networks.
💻 Affected Systems
- MOXA Mgate MB3180
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete unavailability of the web management interface, potentially disrupting industrial control operations that rely on these gateways for protocol conversion and communication.
Likely Case
Temporary web service unavailability requiring device reboot, causing operational disruption until service is restored.
If Mitigated
Minimal impact with proper network segmentation and rate limiting in place.
🎯 Exploit Status
Simple SYN flood attack requiring no authentication; exploit tools widely available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in available references
Vendor Advisory: No official vendor advisory found in provided references
Restart Required: No
Instructions:
Check MOXA website for firmware updates; no specific patching instructions available in provided references.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Mgate devices in separate network segments with firewall rules limiting access to web interface
Rate Limiting
allImplement network-level rate limiting for TCP SYN packets to the device's management IP
🧯 If You Can't Patch
- Restrict network access to web management interface to trusted IP addresses only
- Monitor for SYN flood patterns and implement automated blocking of suspicious source IPs
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web interface or serial console; if running Version 2.1 Build 18113012, device is vulnerable
Check Version:
Check via web interface at System > Information or via serial console connection
Verify Fix Applied:
Verify firmware has been updated to a version later than 2.1 Build 18113012
📡 Detection & Monitoring
Log Indicators:
- High volume of TCP SYN packets to port 80/443
- Web service crash/restart events
- Connection timeout errors
Network Indicators:
- SYN flood patterns to device IP
- Unusual high-volume traffic to management ports
- TCP half-open connection buildup
SIEM Query:
source_ip=* AND dest_port IN (80,443) AND tcp_flags="SYN" AND count > threshold
🔗 References
- https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33823.md
- https://www.moxa.com/en/products/industrial-edge-connectivity/protocol-gateways/modbus-tcp-gateways/mgate-mb3180-mb3280-mb3480-series
- https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33823.md
- https://www.moxa.com/en/products/industrial-edge-connectivity/protocol-gateways/modbus-tcp-gateways/mgate-mb3180-mb3280-mb3480-series