diff --git a/cves/2024/9xxx/CVE-2024-9140.json b/cves/2024/9xxx/CVE-2024-9140.json new file mode 100644 index 000000000000..af932751b334 --- /dev/null +++ b/cves/2024/9xxx/CVE-2024-9140.json @@ -0,0 +1,255 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-9140", + "assignerOrgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa", + "state": "PUBLISHED", + "assignerShortName": "Moxa", + "dateReserved": "2024-09-24T07:11:44.997Z", + "datePublished": "2025-01-03T08:26:18.298Z", + "dateUpdated": "2025-01-03T08:26:18.298Z" + }, + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "EDR-8010 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "3.13.1", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "EDR-G9004 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "3.13.1", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "EDR-G9010 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "3.13.1", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "EDF-G1002-BP Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "3.13.1", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "NAT-102 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "1.0.5", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "OnCell G4302-LTE4 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "3.13", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "TN-4900 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "3.13", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + } + ], + "credits": [ + { + "lang": "en", + "type": "finder", + "value": "Lars Haulin" + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "
Moxa’s cellular routers, secure routers, and network security appliances are affected by a critical vulnerability, CVE-2024-9140. This vulnerability allows OS command injection due to improperly restricted commands, potentially enabling attackers to execute arbitrary code. This poses a significant risk to the system’s security and functionality.
" + } + ], + "value": "Moxa’s cellular routers, secure routers, and network security appliances are affected by a critical vulnerability, CVE-2024-9140. This vulnerability allows OS command injection due to improperly restricted commands, potentially enabling attackers to execute arbitrary code. This poses a significant risk to the system’s security and functionality." + } + ], + "impacts": [ + { + "capecId": "CAPEC-88", + "descriptions": [ + { + "lang": "en", + "value": "CAPEC-88: OS Command Injection" + } + ] + } + ], + "metrics": [ + { + "cvssV4_0": { + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "attackVector": "NETWORK", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "privilegesRequired": "NONE", + "providerUrgency": "NOT_DEFINED", + "subAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "userInteraction": "NONE", + "valueDensity": "NOT_DEFINED", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", + "version": "4.0", + "vulnAvailabilityImpact": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnerabilityResponseEffort": "NOT_DEFINED" + }, + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ] + }, + { + "cvssV3_1": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + }, + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ] + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "cweId": "CWE-78", + "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)", + "lang": "en", + "type": "CWE" + } + ] + } + ], + "providerMetadata": { + "orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa", + "shortName": "Moxa", + "dateUpdated": "2025-01-03T08:26:18.298Z" + }, + "references": [ + { + "tags": [ + "vendor-advisory" + ], + "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241155-privilege-escalation-and-os-command-injection-vulnerabilities-in-cellular-routers,-secure-routers,-and-netwo" + } + ], + "solutions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Moxa has developed appropriate solutions to address vulnerability. The solutions for the affected products are listed below.
Minimize network exposure to ensure the device is not accessible from the Internet.
Limit SSH access to trusted IP addresses and networks using firewall rules or TCP wrappers.
Implement IDS or Intrusion Prevention System (IPS) to detect and prevent exploitation attempts. These systems can provide an additional layer of defense by monitoring network traffic for signs of attacks.