CVE-2024-1220
📋 TL;DR
A stack-based buffer overflow vulnerability in the built-in web server of Moxa NPort W2150A/W2250A Series devices allows remote attackers to send crafted payloads to cause denial of service. This affects devices running firmware version 2.3 and earlier. Organizations using these industrial networking devices are at risk.
💻 Affected Systems
- Moxa NPort W2150A Series
- Moxa NPort W2250A Series
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device crash leading to permanent denial of service, requiring physical reset or replacement of affected industrial networking equipment.
Likely Case
Temporary denial of service causing network connectivity loss for connected industrial devices until manual reboot.
If Mitigated
Minimal impact if devices are patched, isolated, or have web interfaces disabled.
🎯 Exploit Status
Remote exploitation requires no authentication. The vulnerability is in the web service interface, making it accessible to any network-accessible attacker.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware version 2.4 or later
Restart Required: Yes
Instructions:
1. Download firmware version 2.4 or later from Moxa website. 2. Log into device web interface. 3. Navigate to Maintenance > Firmware Upgrade. 4. Upload new firmware file. 5. Wait for upgrade to complete and device to reboot.
🔧 Temporary Workarounds
Disable Web Interface
allDisable the built-in web server if not required for operations
Navigate to Network > Web Server in web interface and disable
Network Segmentation
allIsolate devices in separate VLAN with restricted access
Configure firewall rules to block external access to port 80/443
🧯 If You Can't Patch
- Implement strict network access controls to limit web interface access to trusted IPs only
- Deploy network intrusion detection systems to monitor for exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface: System > System Information > Firmware Version
Check Version:
No CLI command - use web interface at System > System Information
Verify Fix Applied:
Verify firmware version shows 2.4 or later after upgrade
📡 Detection & Monitoring
Log Indicators:
- Web server crash logs
- Unusual HTTP requests with long payloads
- Device reboot events
Network Indicators:
- HTTP requests with unusually long parameters to device web interface
- Traffic spikes to port 80/443 followed by service unavailability
SIEM Query:
source="moxa-device" AND (event="web_server_crash" OR event="device_reboot")
🔗 References
- https://www.moxa.com/en/support/product-support/security-advisory/mpsa-238975-nport-w2150a-w2250a-series-web-server-stack-based-buffer-overflow-vulnerability
- https://www.moxa.com/en/support/product-support/security-advisory/mpsa-238975-nport-w2150a-w2250a-series-web-server-stack-based-buffer-overflow-vulnerability