Home / Advisories / KLCERT advisories / KLCERT-20-001: Remote Code Execution on Moxa’s cellular management software OnCell Central Manager Version lower than 2.4.1

KLCERT-20-001: Remote Code Execution on Moxa’s cellular management software OnCell Central Manager Version lower than 2.4.1

Kaspersky publishes information on newly identified vulnerabilities in order to raise user awareness of the IT security threats detected. Kaspersky does not make any guarantees in respect of information received from vendors of products in which vulnerabilities have been identified, which is included in the following sections of the advisory: Affected Products, Vendor Mitigation.

KL-IDS KLCERT-20-001
CVE-IDS CVE-2017-5641 – Remote Code Execution
Publication date 2020.03.16
Researcher Sergey Temnikov, Kaspersky ICS CERT
Description Moxa’s cellular management software OnCell Central Manager Version lower than 2.4.1 was affected to Remote Code Execution due to vulnerable third-party component usage (Apache Flex BlazeDS).
Impact Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code.
Severity
CVSS v3 Base Score: 9.8
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Exploitability Remotely
Difficulty Low
User interaction None
Existence of exploit Unknown
Affected products
Affected products OnCell Central Manager Version lower than 2.4.1
Mitigation
Vendor mitigation The library that uses OnCell Central Manager has been migrated to Apache’s latest release version 4.7.3 which has fixed these vulnerabilities.
Please contact Moxa Technical Support for the security patch.
Timeline Nov 2019 – Vulnerabilities reported
Mar 2020 – Vendor releases patch
Mar 2020 – Advisory published