Industrial networking company Moxa has alerted customers to a critical vulnerability in the firmware of two of its industrial Ethernet switch product lines. The flaw, tracked as CVE-2023-38408, exists in the OpenSSH component and could allow an unauthenticated, remote attacker to achieve remote code execution (RCE). The affected products, the EDS-G4000 and RKS-G4000 series switches, are specifically designed for harsh environments and are widely deployed in industrial control systems (ICS) and critical infrastructure sectors like energy, transportation, and manufacturing. A successful exploit could lead to a complete compromise of the network device, enabling an attacker to disrupt industrial processes or pivot deeper into the operational technology (OT) network. The Canadian Centre for Cyber Security has also issued an alert, amplifying the urgency for administrators to apply the available patches.
CVE-2023-38408CVE-2023-38408 specifically refers to a flaw where a malicious SSH client or server could trick the other into loading code from pkcs11.so and executing it, if certain libraries are forwarded. This could lead to a full takeover of the switch.The vulnerability affects the following Moxa industrial switch series:
These devices are ruggedized switches intended for deployment in factory floors, power substations, railway systems, and other critical infrastructure environments.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| network_traffic_pattern | Anomalous SSH connections | SSH connections to the switch's management interface from untrusted or unexpected IP addresses. | Firewall and network access logs. | medium |
| log_source | Moxa switch system logs | Monitor for unexpected reboots, service crashes (especially the SSH daemon), or error messages related to the pkcs11 library. |
SIEM analysis of device syslog. | high |
| process_name | Unexpected processes on the switch | If process monitoring is possible, look for any child processes spawned by the SSH daemon that are not part of its normal operation. | Advanced device monitoring. | low |
port 22) access attempts to the switches. Alert on any connections originating from outside the designated management network or from unauthorized administrator workstations. This is a form of D3FEND Inbound Traffic Filtering (D3-ITF).Apply the patched firmware provided by Moxa to remediate the vulnerability.
Mapped D3FEND Techniques:
Isolate the OT network from the IT network and restrict access to the switch's management interface to a secure, dedicated management zone.
Use ACLs to strictly limit which hosts are allowed to connect to the SSH service on the switch.
The primary and most urgent countermeasure is to apply the firmware updates released by Moxa. In OT environments, patching can be challenging due to uptime requirements. Therefore, this must be scheduled during a planned maintenance window. Before deployment, the new firmware should be tested in a lab environment if possible to ensure it doesn't negatively impact industrial processes. Use an OT asset inventory system to identify all affected EDS-G4000 and RKS-G4000 switches and track the patching progress to completion. Given the critical nature of the vulnerability and the devices, this should be a top priority for the control systems engineering team.
As a fundamental principle of ICS security, robust network isolation is a powerful compensating control for this vulnerability. The management interfaces of all Moxa switches should be placed on a dedicated, out-of-band management network that is physically or logically separated from the process control network and the corporate IT network. Access to this management network should be controlled by a firewall and restricted to a handful of authorized jump boxes or administrator workstations. This prevents an attacker on the IT network or another part of the OT network from being able to reach the vulnerable SSH service on the switch, effectively containing the risk.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats