PatchSiren cyber security CVE debrief
CVE-2016-9366 Moxa CVE debrief
CVE-2016-9366 is a critical authentication-bypass issue in multiple Moxa NPort firmware lines. The vulnerability allows a network attacker to use brute force to determine parameters needed to bypass authentication, and NVD rates the impact as CVSS 9.8 with high confidentiality, integrity, and availability impact.
- Vendor
- Moxa
- Product
- CVE-2016-9366
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-13
- Advisory updated
- 2026-05-13
Who should care
Organizations running Moxa NPort serial-to-Ethernet device servers, especially OT/ICS environments and any network team exposing these devices to untrusted or broadly reachable networks.
Technical summary
According to the NVD record, affected Moxa NPort firmware branches include multiple product series prior to their fixed versions. The core issue is that an attacker can freely brute force parameters needed to bypass authentication. NVD assigns CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H and lists CWE-264. Because the attack requires no privileges and no user interaction, exposure on reachable networks materially raises risk.
Defensive priority
Immediate
Recommended defensive actions
- Identify all Moxa NPort devices and verify exact series and firmware versions against the affected ranges in the NVD record.
- Upgrade to the first fixed firmware versions listed by the vendor/NVD for each affected NPort series.
- Restrict network access to management interfaces and place device servers behind trusted administrative networks or VPNs where possible.
- Monitor for unusual authentication activity, repeated login attempts, or configuration changes on exposed devices.
- If a device cannot be patched promptly, compensate with segmentation, ACLs, and strict administrative access controls until remediation is complete.
Evidence notes
CVE published by NVD on 2017-02-13T21:59:02.253Z and last modified on 2026-05-13T00:24:29.033Z. The supplied NVD data states that an attacker can freely use brute force to determine parameters needed to bypass authentication. NVD assigns CVSS 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and lists CWE-264. Affected versions span multiple Moxa NPort series, with fixed-version cutoffs recorded in the NVD CPE criteria. The KEV field in the supplied data is false.
Official resources
-
CVE-2016-9366 CVE record
CVE.org
-
CVE-2016-9366 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, US Government Resource
Publicly disclosed in the NVD record on 2017-02-13. The supplied data shows a later metadata update on 2026-05-13; that date reflects record modification, not initial disclosure.