13 Jun
13Jun

Moxa has issued a high-severity security advisory for a newly discovered vulnerabilityβ€”CVE-2024-9404β€”that affects its widely deployed PT-G7728 and PT-G7828 industrial Ethernet switches. This flaw could allow attackers to remotely crash or cold start the system, resulting in a denial-of-service (DoS) condition.
β€œDue to insufficient input validation, this service can be exploited to trigger a cold start or denial-of-service condition,” Moxa warns in its advisory.
The vulnerability exists in the moxa_cmd service, a deployment-focused feature that, when left exposed, becomes a potential vector for remote abuse. By sending specially crafted packets, unauthenticated attackers can crash the service or force a device rebootβ€”interrupting mission-critical operations in environments such as transportation, energy, or manufacturing.

β€œIf exposed to public networks, the vulnerability poses a significant remote threat, potentially allowing attackers to shut down affected systems,” Moxa emphasizes.

Moxa recommends the following actions to protect affected systems:


Product SeriesFirmware Versions Impacted
PT-G7728 Series6.5 and earlier
PT-G7828 Series6.5 and earlier


Recommendations:
Security patches are available via Moxa Technical SupportUsers should contact Moxa directly to obtain the latest firmwareInterim Mitigation:
Disable the β€œMoxa Service” and β€œMoxa Service (Encrypted)” if not in active useLimit external access to Moxa devices via firewall rules or segmentation

Comments
* The email will not be published on the website.