CVE-2024-9404

7.5 HIGH

📋 TL;DR

This vulnerability in Moxa's moxa_cmd service allows attackers to cause denial-of-service or service crashes through insufficient input validation. It affects multiple Moxa industrial networking products including switches and serial device servers. Organizations using affected Moxa equipment are at risk of operational disruption.

💻 Affected Systems

Products:
  • Moxa VPort 07-3 Series
  • Moxa EDS, ICS, IKS, and SDS switches
  • Moxa PT switches
Versions: Specific versions listed in vendor advisories
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with moxa_cmd service enabled, which is typically enabled by default on affected products.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system shutdown or persistent service unavailability, potentially disrupting critical industrial operations and causing production downtime.

🟠

Likely Case

Service crashes requiring manual restart, causing temporary operational disruption until services are restored.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, allowing quick detection and recovery.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to the moxa_cmd service and knowledge of the input validation flaw.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check specific product advisories for patched firmware versions

Vendor Advisory: https://www.moxa.com/en/support/product-support/security-advisory

Restart Required: Yes

Instructions:

1. Identify affected product model and current firmware version. 2. Download patched firmware from Moxa support portal. 3. Backup current configuration. 4. Apply firmware update following vendor instructions. 5. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks and restrict access to moxa_cmd service

Service Disablement

all

Disable moxa_cmd service if not required for operations

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted sources only
  • Deploy network monitoring and intrusion detection for anomalous traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against affected versions in Moxa advisories

Check Version:

Device-specific commands vary by product; typically accessible via web interface or CLI

Verify Fix Applied:

Verify firmware version matches or exceeds patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Service crash logs
  • Unexpected moxa_cmd service restarts
  • Connection attempts to moxa_cmd service

Network Indicators:

  • Unusual traffic patterns to moxa_cmd service port
  • Multiple connection attempts from single sources

SIEM Query:

source="moxa_device" AND (event="service_crash" OR event="unexpected_restart")

🔗 References

📤 Share & Export