CVE-2024-9138

Privilege Escalation in Cellular Router, Secure Router, and Network Security Appliances

Description

Moxa’s cellular routers, secure routers, and network security appliances are affected by a high-severity vulnerability, CVE-2024-9138. This vulnerability involves hard-coded credentials, enabling an authenticated user to escalate privileges and gain root-level access to the system, posing a significant security risk.

Remediation

Solution:

  • Moxa has developed appropriate solutions to address vulnerability. The solutions for the affected products are listed below. * EDR-810 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-810-series#resources  or later * EDR-8010 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-8010-series#resources  or later * EDR-G902 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g902-series#resources  or later * EDR-G903 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g903-series#resources  or later * EDR-G9004 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g9004-series#resources  or later * EDR-G9010 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g9010-series#resources  or later * EDF-G1002-BP Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/network-security-appliance/edf-g1002-bp-series#resources  or later * NAT-102 Series: An official patch or firmware update is not currently available for this product. Please refer to the Mitigations section below for recommended measures to address the vulnerability. * OnCell G4302-LTE4 Series: Please contact Moxa Technical Support https://www.moxa.com/support/support/technical-support  for the security patch * TN-4900 Series: Please contact Moxa Technical Support https://www.moxa.com/support/support/technical-support  for the security patch

Workaround:

  • * Minimize network exposure to ensure the device is not accessible from the Internet. * Limit SSH access to trusted IP addresses and networks using firewall rules or TCP wrappers. * Implement IDS or Intrusion Prevention System (IPS) to detect and prevent exploitation attempts. These systems can provide an additional layer of defense by monitoring network traffic for signs of attacks.

Category

8.6
CVSS
Severity: High
CVSS 4.0 •
CVSS 3.1 •
EPSS 0.15%
Vendor Advisory moxa.com
Affected: Moxa EDR-810 Series
Affected: Moxa EDR-8010 Series
Affected: Moxa EDR-G902 Series
Affected: Moxa EDR-G903 Series
Affected: Moxa EDR-G9004 Series
Affected: Moxa EDR-G9010 Series
Affected: Moxa EDF-G1002-BP Series
Affected: Moxa NAT-102 Series
Affected: Moxa OnCell G4302-LTE4 Series
Affected: Moxa TN-4900 Series
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-9138?
CVE-2024-9138 has been scored as a high severity vulnerability.
How to fix CVE-2024-9138?
To fix CVE-2024-9138: Moxa has developed appropriate solutions to address vulnerability. The solutions for the affected products are listed below. * EDR-810 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-810-series#resources  or later * EDR-8010 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-8010-series#resources  or later * EDR-G902 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g902-series#resources  or later * EDR-G903 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g903-series#resources  or later * EDR-G9004 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g9004-series#resources  or later * EDR-G9010 Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/secure-routers/secure-routers/edr-g9010-series#resources  or later * EDF-G1002-BP Series: Upgrade to the firmware version 3.14 https://www.moxa.com/en/products/industrial-network-infrastructure/network-security-appliance/edf-g1002-bp-series#resources  or later * NAT-102 Series: An official patch or firmware update is not currently available for this product. Please refer to the Mitigations section below for recommended measures to address the vulnerability. * OnCell G4302-LTE4 Series: Please contact Moxa Technical Support https://www.moxa.com/support/support/technical-support  for the security patch * TN-4900 Series: Please contact Moxa Technical Support https://www.moxa.com/support/support/technical-support  for the security patch
Is CVE-2024-9138 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-9138 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-9138?
CVE-2024-9138 affects Moxa EDR-810 Series, Moxa EDR-8010 Series, Moxa EDR-G902 Series, Moxa EDR-G903 Series, Moxa EDR-G9004 Series, Moxa EDR-G9010 Series, Moxa EDF-G1002-BP Series, Moxa NAT-102 Series, Moxa OnCell G4302-LTE4 Series, Moxa TN-4900 Series.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.