Skip to main content
Mallory

Moxa Industrial Ethernet Switches Affected by OpenSSH `ssh-agent` RCE (CVE-2023-38408)

industrial-control-system-vulnerabilityembedded-device-vulnerabilitywidely-deployed-product-advisory
Updated March 21, 2026 at 02:53 PM2 sources
Share:
Moxa Industrial Ethernet Switches Affected by OpenSSH `ssh-agent` RCE (CVE-2023-38408)

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Moxa issued guidance for a critical remote code execution (RCE) risk affecting multiple industrial Ethernet switch lines due to CVE-2023-38408 in the OpenSSH ssh-agent PKCS#11 feature (OpenSSH versions prior to 9.3p2). The flaw is described as an unreliable/unquoted search path issue (CWE-428) and is characterized as an incomplete fix related to CVE-2016-10009; exploitation can lead to full device compromise impacting confidentiality, integrity, and availability, with a reported CVSS 3.1 score of 9.8.

Impacted products include Moxa EDS series switches (e.g., EDS-G4000, EDS-4008/4009/4012/4014, EDS-G4008/G4012/G4014) running firmware v4.1 or earlier, and RKS series switches (e.g., RKS-G4000, RKS-G4028, RKS-G4028-L3) running firmware v5.0 or earlier. Moxa’s remediation requires obtaining patches via Moxa Technical Support rather than public download; the cited target versions are 4.1.58 for EDS and 5.0.4 for RKS. Until updates can be applied, recommended mitigations include restricting network access (e.g., firewalls/ACLs) and segmenting OT networks (e.g., VLAN separation) to limit exposure.

Timeline

  1. Jan 13, 2026

    Moxa makes patched firmware available through technical support

    Moxa provided remediation guidance and made fixed firmware available via Moxa Technical Support rather than public download, including versions such as EDS 4.1.58 and RKS 5.0.4. The company also recommended interim mitigations including network segmentation, restricted access, hardening authentication, avoiding Internet exposure, and monitoring for anomalies.

  2. Jan 13, 2026

    Moxa issues advisory for affected EDS and RKS Ethernet switches

    Moxa disclosed that multiple industrial Ethernet switch models in its EDS and RKS series were affected by CVE-2023-38408, including EDS firmware 4.1 or earlier and RKS firmware 5.0 or earlier. The company warned that exploitation could lead to full system compromise and pose risks to OT environments.

  3. Jan 13, 2026

    OpenSSH flaw CVE-2023-38408 disclosed as incomplete fix for CVE-2016-10009

    CVE-2023-38408 was identified in OpenSSH's ssh-agent PKCS#11 feature, where an unreliable library search path could allow remote code execution when agent forwarding is used to an attacker-controlled system. The issue was described as an incomplete fix for CVE-2016-10009 and assigned a CVSS score of 9.8.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Moxa Product Flaws Enable Privilege Escalation and Security Policy Bypass

Moxa Product Flaws Enable Privilege Escalation and Security Policy Bypass

CERT-FR published two advisories covering vulnerabilities in **Moxa** products, warning that the flaws could let attackers **escalate privileges** and undermine core security controls. One notice said successful exploitation could also affect **data confidentiality** and **data integrity**, raising concern for industrial and networked environments where Moxa equipment is commonly deployed. A separate CERT-FR notice reported another Moxa vulnerability that could allow an attacker to **bypass the security policy**. The advisories did not provide further technical details in the referenced content, including affected models, `CVE` identifiers, or specific remediation steps, leaving organizations to monitor vendor and national CERT guidance closely for product impact and patch information.

1 weeks ago
Moxa DA Series BIOS/Intel Firmware Vulnerabilities Affecting Industrial PCs

Moxa DA Series BIOS/Intel Firmware Vulnerabilities Affecting Industrial PCs

**Moxa** published security advisories for its industrial computer **DA Series** indicating that multiple vulnerabilities in underlying **Intel firmware components** can impact affected devices, including conditions leading to **remote denial of service**, **privilege escalation**, and potential **confidentiality** impacts. Affected systems include **DA-682C** (BIOS versions prior to `v1.6`), **DA-820C** (prior to `v1.3`), and **DA-820E** (as listed by CERT-FR), with the Canadian Centre for Cyber Security also flagging DA Series BIOS exposure broadly and calling out DA-682C BIOS `v1.5` and earlier and DA-820C BIOS `v1.2` and earlier. The advisories map to Intel security issues including **Intel BIOS firmware DoS** (**INTEL-SA-00813**) and multiple vulnerabilities in **Intel CSME/AMT** (**INTEL-SA-00391**, **INTEL-SA-00709**). CERT-FR’s notice references related CVEs (including **CVE-2020-8747**, **CVE-2020-8749**, **CVE-2020-8752**, and **CVE-2022-28697**) and directs organizations to apply vendor-provided BIOS updates and mitigations from Moxa’s bulletins (`mpsa-256821`, `mpsa-256822`, `mpsa-256823`) to reduce exposure in operational technology environments.

1 months ago
Critical Hard-Coded JWT Secret Vulnerability in Moxa Network Security Appliances (CVE-2025-6950)

Critical Hard-Coded JWT Secret Vulnerability in Moxa Network Security Appliances (CVE-2025-6950)

A critical security vulnerability, tracked as CVE-2025-6950, has been identified in Moxa network security appliances and routers, allowing unauthenticated attackers to gain administrative access via a hard-coded JWT secret. The flaw, which carries a CVSS score of 9.9, stems from the use of a hard-coded secret key for signing JSON Web Tokens (JWT) used in the authentication process. This insecure implementation enables attackers to forge valid JWTs without any prior authentication, effectively bypassing all access controls. As a result, an attacker can impersonate any user, including administrators, and obtain full control over the affected device. Exploitation of this vulnerability can lead to unauthorized access, data theft, and complete system compromise. The vulnerability is remotely exploitable, significantly increasing the risk to organizations deploying these devices in critical network environments. According to the available reports, there is no evidence that exploitation of this flaw leads to loss of confidentiality or integrity in systems beyond the affected device itself. The vulnerability was disclosed by Moxa’s Product Security Incident Response Team (PSIRT) and has been publicly documented in multiple security advisories. Security researchers emphasize the severity of the issue due to the ease of exploitation and the potential impact on industrial and enterprise networks. The affected products include a range of Moxa network security appliances and routers, though specific model versions have not been detailed in the public advisories. Organizations using these devices are urged to review their deployments and apply any available patches or mitigations as soon as possible. The vulnerability was published and last updated on October 17, 2025, highlighting the need for immediate attention from network administrators. The flaw is distinct from other recent privilege escalation vulnerabilities in Moxa products, as it allows for unauthenticated, rather than authenticated, administrative takeover. Security experts recommend monitoring for signs of unauthorized access and reviewing authentication logs for suspicious activity. The use of hard-coded credentials is a well-known security anti-pattern, and this incident underscores the importance of secure key management in authentication systems. Moxa has been notified and is expected to release further guidance and remediation steps. Until patches are available, organizations should consider network segmentation and access restrictions to limit exposure. The incident has raised concerns about the security of industrial control systems and the potential for similar flaws in other embedded network devices. The vulnerability’s critical rating and remote exploitability make it a high-priority issue for all organizations relying on Moxa network security appliances.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.