PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-8362 Moxa CVE debrief

CVE-2016-8362 is an access-control weakness in multiple Moxa wireless/industrial networking product firmware families. According to the vulnerability description, a user could download log files by accessing a specific URL. NVD assigns the issue CVSS 3.0 6.5 (Medium) and maps it to CWE-287, indicating an authentication/authorization failure that can expose sensitive information.

Vendor
Moxa
Product
CVE-2016-8362
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-13
Original CVE updated
2026-05-13
Advisory published
2017-02-13
Advisory updated
2026-05-13

Who should care

Operators and administrators of affected Moxa OnCell and AWK/WAC/TAP devices, especially teams responsible for remote management, firmware updates, and network segmentation in industrial or operational technology environments.

Technical summary

NVD lists affected firmware for several Moxa product families, including OnCell G3470A-LTE, AWK-1131A/3131A/4131A, AWK-3191, AWK-5232/6232, AWK-1121/1127, WAC-1001 V2, WAC-2004, AWK-3121-M12-RTG, AWK-3131-M12-RCC, AWK-5232-M12-RCC, TAP-6226, AWK-3121/4121, AWK-3131/4131, and AWK-5222/6222. The NVD vector is AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, which is consistent with a network-reachable issue requiring low privileges and primarily affecting confidentiality. The supplied description specifically says a user could download log files by visiting a particular URL.

Defensive priority

Medium. The issue is network-reachable and can expose confidential log data, but the supplied severity is CVSS 6.5 and there is no integrity or availability impact indicated in the NVD vector.

Recommended defensive actions

  • Inventory Moxa devices and firmware versions against the affected product families listed by NVD.
  • Apply vendor-provided firmware updates or mitigation guidance referenced in the ICS-CERT advisory and NVD record.
  • Restrict management interfaces and log-access endpoints to trusted administration networks only.
  • Review exposed web interfaces on affected devices for unexpected direct-access URLs to sensitive files.
  • Segment OT/industrial networking equipment from general user networks and monitor for unauthorized access to device administration pages.
  • Validate that log files do not contain credentials, tokens, or other sensitive operational data before and after remediation.

Evidence notes

This debrief is based only on the supplied CVE/NVD corpus and the listed official references. The core facts used are: the vulnerability description stating that any user can download log files by accessing a specific URL; NVD CVSS 3.0 vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N; CWE-287; the affected Moxa firmware CPE entries in NVD; and the official references to the CVE record, NVD detail, and ICS-CERT advisory ICSA-16-308-01. No exploit steps or unsupported operational details are included.

Official resources

The CVE was published in the supplied record on 2017-02-13T21:59:01.050Z and modified on 2026-05-13T00:24:29.033Z. Those dates are used here only as record timing context, not as the date of exploitation or discovery beyond what the source.