Cyber Posture

CVE-2024-9138

High

Published: 03 January 2025

Published
03 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0018 39.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-9138 is a high-severity Reliance on Security Through Obscurity (CWE-656) vulnerability in Moxa (inferred from references). Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 39.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely remediation of flaws such as hard-coded credentials through patching as specified in the vendor security advisory.

prevent

Requires proper management and protection of authenticators, directly preventing the embedding and exposure of hard-coded credentials that enable privilege escalation.

prevent

Enforces least privilege restrictions, limiting the scope and impact of privilege escalation even if hard-coded credentials are exploited by high-privilege users.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Hard-coded credentials enable authenticated network-based privilege escalation to root (T1068) on public-facing appliances (T1190); related OS command injection directly maps to Unix shell execution (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Moxa’s cellular routers, secure routers, and network security appliances are affected by a high-severity vulnerability, CVE-2024-9138. This vulnerability involves hard-coded credentials, enabling an authenticated user to escalate privileges and gain root-level access to the system, posing a significant security risk.

Deeper analysisAI

CVE-2024-9138 is a high-severity vulnerability (CVSS 7.2, CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) affecting Moxa's cellular routers, secure routers, and network security appliances. The issue stems from hard-coded credentials (CWE-656), which allow an authenticated user to escalate privileges and obtain root-level access to the system.

An attacker with high-level privileges (PR:H) can exploit this vulnerability over the network (AV:N) with low complexity (AC:L) and no user interaction required. Successful exploitation grants root access, enabling high-impact confidentiality, integrity, and availability compromises, such as full system control.

Moxa's security advisory (MPSA-241155) details the privilege escalation and related OS command injection vulnerabilities in the affected products, providing guidance on mitigation measures. Security practitioners should consult the advisory at https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241155-privilege-escalation-and-os-command-injection-vulnerabilities-in-cellular-routers,-secure-routers,-and-netwo for patching instructions and workarounds.

Details

CWE(s)

Affected Products

Moxa
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-42363Shared CWE-656
CVE-2026-7161Shared CWE-656

References