CVE-2023-28697
📋 TL;DR
Moxa MiiNePort E1 devices have an insufficient access control vulnerability that allows unauthenticated remote attackers to perform arbitrary system operations or disrupt services. This affects all organizations using vulnerable MiiNePort E1 devices, particularly those with internet-facing deployments. The vulnerability stems from missing authentication mechanisms for critical functions.
💻 Affected Systems
- Moxa MiiNePort E1 Series
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to execute arbitrary commands, modify configurations, disrupt industrial operations, or use the device as a pivot point into industrial control networks.
Likely Case
Service disruption through device reboots or configuration changes, potentially causing industrial process interruptions or data loss.
If Mitigated
Limited impact if devices are isolated in segmented networks with strict firewall rules preventing external access.
🎯 Exploit Status
The vulnerability requires no authentication and minimal technical skill to exploit, making it attractive for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware v1.9
Restart Required: Yes
Instructions:
1. Download firmware v1.9 from Moxa website. 2. Backup current configuration. 3. Upload firmware via web interface or CLI. 4. Reboot device. 5. Verify firmware version. 6. Restore configuration if needed.
🔧 Temporary Workarounds
Network Segmentation
allIsolate MiiNePort E1 devices in separate VLANs with strict firewall rules preventing external access.
Access Control Lists
allImplement network ACLs to restrict access to MiiNePort devices to authorized management IPs only.
🧯 If You Can't Patch
- Segment devices in isolated networks with no internet access
- Implement strict firewall rules allowing only necessary traffic from trusted sources
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface (System > About) or CLI command 'show version'. If version is below 1.9, device is vulnerable.
Check Version:
show version
Verify Fix Applied:
Verify firmware version shows 1.9 or higher after update. Test that unauthenticated access to administrative functions is blocked.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated access attempts to administrative endpoints
- Unexpected configuration changes
- Multiple failed authentication attempts followed by successful access
Network Indicators:
- Unusual traffic patterns to device management ports
- External IPs accessing device administrative interfaces
- Traffic from unexpected geographic locations
SIEM Query:
source_ip=external AND dest_port=80,443 AND dest_ip=MiiNePort_device AND (uri_path CONTAINS "/admin" OR uri_path CONTAINS "/config")
🔗 References
- https://cdn-cms.azureedge.net/Moxa/media/PDIM/S100000223/MiiNePort%20E1%20Series_moxa-miineport-e1-series-firmware-v1.9.rom_Software%20Release%20History.pdf
- https://www.twcert.org.tw/tw/cp-132-7021-eb43a-1.html
- https://cdn-cms.azureedge.net/Moxa/media/PDIM/S100000223/MiiNePort%20E1%20Series_moxa-miineport-e1-series-firmware-v1.9.rom_Software%20Release%20History.pdf
- https://www.twcert.org.tw/tw/cp-132-7021-eb43a-1.html