PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-9356 Moxa CVE debrief

CVE-2016-9356 affects Moxa DACenter version 1.4 and older and is described as an unquoted search path issue. NVD rates the issue 7.8 HIGH, with local attack requirements and high impacts to confidentiality, integrity, and availability. Systems running affected DACenter releases should be reviewed promptly, especially where local user access is possible.

Vendor
Moxa
Product
CVE-2016-9356
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-13
Original CVE updated
2026-05-13
Advisory published
2017-02-13
Advisory updated
2026-05-13

Who should care

Administrators and operators responsible for Moxa DACenter deployments, especially on systems where local users, support accounts, or shared administrative access exist.

Technical summary

The NVD record maps CVE-2016-9356 to Moxa DACenter versions through 1.4 and identifies a local attack vector with low complexity and low privileges required. The weakness is described as an unquoted search path issue, and NVD assigns CWE-284 in its metadata. The CVSS 3.0 vector is AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating that successful exploitation could have significant impact once an attacker has local access.

Defensive priority

High for affected installations. The combination of local access requirements and high CIA impact means this should be addressed as a priority wherever DACenter 1.4 or older is present.

Recommended defensive actions

  • Inventory all Moxa DACenter installations and identify any systems running version 1.4 or older.
  • Check the linked NVD, CVE.org, and ICS-CERT references for vendor or mitigation guidance applicable to your environment.
  • Restrict local access to affected hosts and minimize the number of users or service accounts with interactive or administrative access.
  • Remove, update, or replace affected DACenter deployments where a fixed version or vendor-supported mitigation is available.
  • Review affected systems for unusual executable launches or other signs of local tampering consistent with a search-path issue.

Evidence notes

Supported by the NVD record and linked references: the vulnerable CPE is listed as cpe:2.3:a:moxa:dacenter:* with versions through 1.4, the CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, and the metadata includes CWE-284. References provided in the source corpus include SecurityFocus BID 94891 and the US-CERT/ICS-CERT advisory ICSA-16-348-02.

Official resources

The CVE record was published on 2017-02-13. The supplied NVD source item shows the record as modified on 2026-05-13 and cites SecurityFocus BID 94891 plus ICS-CERT advisory ICSA-16-348-02 as references.