Search criteria
ⓘ
Use full-text search for keyword queries.
Combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by dates instead of relevance.
2 vulnerabilities found for DA-820C Series by Moxa
CERTFR-2026-AVI-0252
Vulnerability from certfr_avis - Published: 2026-03-09 - Updated: 2026-03-09
De multiples vulnérabilités ont été découvertes dans les produits Moxa. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
L'éditeur a fourni certaines recommandations afin de limiter les attaques potentielles de certaines d'entre elles.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Moxa | DA-682C Series | DA-682C Series sans la version v1.6 du BIOS | ||
| Moxa | DA-820C Series | DA-820E Series | ||
| Moxa | DA-820C Series | DA-820C Series sans la version v1.3 du BIOS |
References
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "DA-682C Series sans la version v1.6 du BIOS",
"product": {
"name": "DA-682C Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "DA-820E Series",
"product": {
"name": "DA-820C Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "DA-820C Series sans la version v1.3 du BIOS",
"product": {
"name": "DA-820C Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-30944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30944"
},
{
"name": "CVE-2022-30601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30601"
},
{
"name": "CVE-2020-8749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8749"
},
{
"name": "CVE-2022-43505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43505"
},
{
"name": "CVE-2020-8747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8747"
},
{
"name": "CVE-2022-28697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28697"
},
{
"name": "CVE-2020-8752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8752"
}
],
"initial_release_date": "2026-03-09T00:00:00",
"last_revision_date": "2026-03-09T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0252",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Moxa. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nL\u0027\u00e9diteur a fourni certaines recommandations afin de limiter les attaques potentielles de certaines d\u0027entre elles.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Moxa",
"vendor_advisories": [
{
"published_at": "2026-03-09",
"title": "Bulletin de s\u00e9curit\u00e9 Moxa mpsa-256821",
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-256821-security-enhancement-intel%C2%AE-bios-firmware-dos-(intel-sa-00813)"
},
{
"published_at": "2026-03-09",
"title": "Bulletin de s\u00e9curit\u00e9 Moxa mpsa-256823",
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-256823-security-enhancement-intel%C2%AE-active-management-technology-(amt)-multiple-vulnerabilities-(intel-sa-00709)"
},
{
"published_at": "2026-03-09",
"title": "Bulletin de s\u00e9curit\u00e9 Moxa mpsa-256822",
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-256822-security-enhancement-intel%C2%AE-converged-security-management-engine-(csme)-active-management-technology-(amt)"
}
]
}
CERTFR-2021-AVI-127
Vulnerability from certfr_avis - Published: 2021-02-17 - Updated: 2021-02-17
Une vulnérabilité a été découverte dans les produits Moxa. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Moxa | MPC-2120 Series | MPC-2120 Series DA | ||
| Moxa | DA-682C Series | DA-682C Series DA | ||
| Moxa | UC-3100 Series | UC-3100 Series DA | ||
| Moxa | N/A | V2426A Series DA | ||
| Moxa | N/A | V2416A Series DA | ||
| Moxa | DA-681A Series | DA-681A Series DA | ||
| Moxa | UC-8410A Series | UC-8410A Series DA | ||
| Moxa | DA-820C Series | DA-820C Series DA | ||
| Moxa | MPC-2070 Series | MPC-2070 Series DA | ||
| Moxa | UC-2100 Series | UC-2100 Series DA | ||
| Moxa | DA-720 Series | DA-720 Series DA | ||
| Moxa | MPC-2121 Series | MPC-2121 Series DA | ||
| Moxa | DA-681C Series | DA-681C Series DA | ||
| Moxa | V2201 Series | V2201 Series DA | ||
| Moxa | UC-8200 Series | UC-8200 Series DA | ||
| Moxa | N/A | V2406A Series DA | ||
| Moxa | N/A | V2403 Series DA | ||
| Moxa | MPC-2101 Series | MPC-2101 Series DA | ||
| Moxa | N/A | UC-5100 Series DA | ||
| Moxa | V2406C Series | V2406C Series DA | ||
| Moxa | UC-8540 Series | UC-8540 Series DA | ||
| Moxa | N/A | UC-2100-W Series DA | ||
| Moxa | N/A | MC-1200 Series DA | ||
| Moxa | UC-8100A-ME-T Series | UC-8100A-ME-T Series DA | ||
| Moxa | UC-8100 Series | UC-8100 Series DA | ||
| Moxa | ioThinx 4530 Series | ioThinx 4530 Series DA | ||
| Moxa | N/A | V2616A Series DA | ||
| Moxa | UC-8580 Series | UC-8580 Series DA | ||
| Moxa | MC-1100 Series | MC-1100 Series DA | ||
| Moxa | N/A | UC-8100-ME-T Series DA |
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MPC-2120 Series DA",
"product": {
"name": "MPC-2120 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "DA-682C Series DA",
"product": {
"name": "DA-682C Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "UC-3100 Series DA",
"product": {
"name": "UC-3100 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "V2426A Series DA",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "V2416A Series DA",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "DA-681A Series DA",
"product": {
"name": "DA-681A Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "UC-8410A Series DA",
"product": {
"name": "UC-8410A Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "DA-820C Series DA",
"product": {
"name": "DA-820C Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "MPC-2070 Series DA",
"product": {
"name": "MPC-2070 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "UC-2100 Series DA",
"product": {
"name": "UC-2100 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "DA-720 Series DA",
"product": {
"name": "DA-720 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "MPC-2121 Series DA",
"product": {
"name": "MPC-2121 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "DA-681C Series DA",
"product": {
"name": "DA-681C Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "V2201 Series DA",
"product": {
"name": "V2201 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "UC-8200 Series DA",
"product": {
"name": "UC-8200 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "V2406A Series DA",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "V2403 Series DA",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "MPC-2101 Series DA",
"product": {
"name": "MPC-2101 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "UC-5100 Series DA",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "V2406C Series DA",
"product": {
"name": "V2406C Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "UC-8540 Series DA",
"product": {
"name": "UC-8540 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "UC-2100-W Series DA",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "MC-1200 Series DA",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "UC-8100A-ME-T Series DA",
"product": {
"name": "UC-8100A-ME-T Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "UC-8100 Series DA",
"product": {
"name": "UC-8100 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "ioThinx 4530 Series DA",
"product": {
"name": "ioThinx 4530 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "V2616A Series DA",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "UC-8580 Series DA",
"product": {
"name": "UC-8580 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "MC-1100 Series DA",
"product": {
"name": "MC-1100 Series",
"vendor": {
"name": "Moxa",
"scada": true
}
}
},
{
"description": "UC-8100-ME-T Series DA",
"product": {
"name": "N/A",
"vendor": {
"name": "Moxa",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
}
],
"initial_release_date": "2021-02-17T00:00:00",
"last_revision_date": "2021-02-17T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-127",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-02-17T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Moxa. Elle permet \u00e0\nun attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Moxa",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Moxa cve-2021-3156 du 17 f\u00e9vrier 2021",
"url": "https://www.moxa.com/en/support/product-support/security-advisory/moxa-response-regarding-sudo-heap-based-buffer-overflow-vulnerability-cve-2021-3156"
}
]
}