PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-9332 Moxa CVE debrief

CVE-2016-9332 is a high-severity denial-of-service issue in Moxa SoftCMS versions prior to 1.6. The NVD record states that the SoftCMS Webserver does not properly validate input, and that unexpected values may crash the program or trigger excessive resource consumption. Because the issue is network-reachable and requires no privileges or user interaction, exposed deployments should be treated as a meaningful operational risk.

Vendor
Moxa
Product
CVE-2016-9332
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-13
Original CVE updated
2026-05-13
Advisory published
2017-02-13
Advisory updated
2026-05-13

Who should care

Organizations running Moxa SoftCMS, especially environments where the SoftCMS Webserver is reachable over the network. OT/ICS operators, plant engineers, and defenders responsible for HMI/management tooling should prioritize review if they use SoftCMS versions earlier than 1.6.

Technical summary

The NVD entry maps the vulnerability to Moxa SoftCMS versions up to 1.5, with a CVSS 3.0 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The weakness is categorized as CWE-399. In practical terms, malformed or unexpected input sent to the webserver can destabilize the service or consume resources until availability is impaired. The corpus also links an ICS-CERT advisory and a public exploit reference, indicating the issue was publicly discussed.

Defensive priority

High for any exposed or operationally important SoftCMS deployment. Availability loss alone can interrupt management or monitoring workflows, so remediation should be scheduled promptly if affected versions are confirmed.

Recommended defensive actions

  • Confirm whether Moxa SoftCMS is installed and identify the exact version in use.
  • Upgrade SoftCMS to version 1.6 or later, since versions prior to 1.6 are listed as vulnerable.
  • Restrict network access to the SoftCMS Webserver to trusted management hosts only.
  • Monitor for abnormal crashes, restarts, or resource spikes affecting the SoftCMS service.
  • Review vendor and ICS guidance referenced in the advisory record for environment-specific mitigation steps.

Evidence notes

This debrief is based on the supplied NVD record and linked references. The NVD data identifies the affected range as Moxa SoftCMS versions up to 1.5, the impact as denial of service, and the weakness as CWE-399. The source corpus includes an ICS-CERT advisory reference and a public exploit reference URL, but no additional technical details were used beyond the supplied record.

Official resources

Published in the CVE record on 2017-02-13 and modified on 2026-05-13. The supplied enrichment does not mark this CVE as KEV.