CVE-2024-7695

7.5 HIGH

📋 TL;DR

An out-of-bounds write vulnerability in multiple Moxa industrial switches allows attackers to write data beyond allocated buffer boundaries due to insufficient input validation. This affects various Moxa PT, EDS, ICS, IKS, SDS, and EN-50155 switch models. Successful exploitation could cause denial-of-service conditions.

💻 Affected Systems

Products:
  • Moxa PT switches
  • Moxa EDS switches
  • Moxa ICS switches
  • Moxa IKS switches
  • Moxa SDS switches
  • Moxa EN-50155 switches
Versions: Specific versions vary by product line - check vendor advisories
Operating Systems: Embedded switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects multiple product families with different firmware versions - exact versions in vendor advisories

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash and permanent denial-of-service requiring physical reset or replacement

🟠

Likely Case

Temporary service disruption requiring device reboot

🟢

If Mitigated

No impact if patched or properly segmented

🌐 Internet-Facing: HIGH - Industrial switches often have web interfaces and may be exposed
🏢 Internal Only: MEDIUM - Requires network access but industrial networks often have flat architectures

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network access to vulnerable switch interfaces; specific exploit conditions not publicly documented

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Varies by product - see vendor advisories for specific fixed versions

Vendor Advisory: https://www.moxa.com/en/support/product-support/security-advisory

Restart Required: Yes

Instructions:

1. Identify affected switch models and current firmware versions. 2. Download appropriate firmware updates from Moxa support portal. 3. Backup current configuration. 4. Apply firmware update following Moxa's upgrade procedures. 5. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate industrial switches from untrusted networks and restrict access to management interfaces

Access Control Lists

all

Implement strict ACLs to limit which IP addresses can communicate with switch management interfaces

🧯 If You Can't Patch

  • Segment switches into isolated VLANs with strict firewall rules
  • Disable unused management interfaces and services

🔍 How to Verify

Check if Vulnerable:

Check switch firmware version against affected versions in Moxa advisories MPSA-240162, MPSA-240163, MPSA-240164

Check Version:

Varies by switch model - typically via web interface (System > About) or CLI (show version)

Verify Fix Applied:

Verify firmware version matches or exceeds patched versions specified in vendor advisories

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Memory allocation errors in system logs
  • Connection attempts to management interfaces from unusual sources

Network Indicators:

  • Unusual traffic patterns to switch management ports
  • Protocol anomalies in switch communication

SIEM Query:

source="switch_logs" AND (event_type="crash" OR event_type="reboot" OR message="*memory*" OR message="*buffer*")

🔗 References

📤 Share & Export