Moxa Active OPC Server Vulnerability

Number: AV16-148
Date: 21 September 2016

Purpose

The purpose of this advisory is to bring attention to an identified unquoted service path escalation vulnerability VulnerabilityA flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations. in Moxa Active OPC Server.

Assessment

Successful exploitation of this vulnerability could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. The most recent version (2.4.19) serves to mitigate this vulnerability.

Version affected: Active OPC Server versions older than Version 2.4.19

CVE Reference: CVE-2016-5793

Suggested action

CCIRC recommends that system administrators test and deploy the vendor-released installations in accordance with the vendor's documentation. Active OPC Server is nearing end of life by the end of 2016, and no further updates will be issue.

References

http://www.moxa.com/support (link is external)
https://ics-cert.us-cert.gov/advisories/ICSA-16-264-01

Date modified: