CVE-2021-39279
📋 TL;DR
This vulnerability allows authenticated attackers to execute arbitrary operating system commands on affected MOXA devices via the /forms/web_importTFTP endpoint. It affects multiple MOXA industrial networking products including WAC, OnCell, TAP, and WDR series devices. Attackers with valid credentials can gain full system control.
💻 Affected Systems
- WAC-2004
- WAC-1001
- WAC-1001-T
- OnCell G3470A-LTE-EU
- OnCell G3470A-LTE-EU-T
- TAP-323-EU-CT-T
- TAP-323-US-CT-T
- TAP-323-JP-CT-T
- WDR-3124A-EU
- WDR-3124A-EU-T
- WDR-3124A-US
- WDR-3124A-US-T
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise leading to lateral movement within industrial networks, data exfiltration, or disruption of critical infrastructure operations.
Likely Case
Unauthorized access to device configuration, installation of backdoors, or use as pivot point for further network attacks.
If Mitigated
Limited impact if proper network segmentation and access controls prevent exploitation attempts.
🎯 Exploit Status
Exploit details published on Packet Storm. Requires valid credentials but command injection is straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific fixed versions per product
Vendor Advisory: https://www.moxa.com
Restart Required: Yes
Instructions:
1. Check MOXA website for firmware updates. 2. Download appropriate firmware for your device model. 3. Backup configuration. 4. Upload firmware via web interface. 5. Reboot device.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict access to device web interface to trusted IP addresses only
iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
Credential Hardening
allChange default credentials and implement strong password policies
🧯 If You Can't Patch
- Isolate affected devices in separate VLAN with strict firewall rules
- Implement network monitoring for unusual traffic patterns from these devices
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against affected versions list. Test web interface access to /forms/web_importTFTP endpoint.
Check Version:
Check via web interface under System > Firmware or via SSH: cat /etc/version
Verify Fix Applied:
Verify firmware version is updated beyond affected versions. Test that command injection no longer works.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /forms/web_importTFTP
- Multiple failed login attempts followed by successful login
- Commands with shell metacharacters in web logs
Network Indicators:
- Unusual outbound connections from industrial devices
- TFTP traffic from devices not expected to use it
SIEM Query:
source="web_logs" AND uri="/forms/web_importTFTP" AND (method="POST" OR method="GET")