Moxa Active OPC Server Vulnerability
Date: 21 September 2016
The purpose of this advisory is to bring attention to an identified unquoted service path escalation vulnerability in Moxa Active OPC Server.
Successful exploitation of this vulnerability could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. The most recent version (2.4.19) serves to mitigate this vulnerability.
Version affected: Active OPC Server versions older than Version 2.4.19
CVE Reference: CVE-2016-5793
CCIRC recommends that system administrators test and deploy the vendor-released installations in accordance with the vendor's documentation. Active OPC Server is nearing end of life by the end of 2016, and no further updates will be issue.
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: