{"vulnerability": "CVE-2024-9140", "sightings": [{"uuid": "b08e6a08-b726-4db7-9c11-3b86c14265d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/113788927085260070", "content": "", "creation_timestamp": "2025-01-07T20:20:39.832607Z"}, {"uuid": "77074bab-c03b-4f81-a961-ffd0a6d014ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lf3ptlc5b727", "content": "", "creation_timestamp": "2025-01-06T18:03:46.553827Z"}, {"uuid": "f5dfe712-2c7a-48ac-85be-e00b48478cf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/bluecyber.bsky.social/post/3lfafmjak2k2k", "content": "", "creation_timestamp": "2025-01-08T14:44:13.803311Z"}, {"uuid": "4bc52fc0-aef4-4a62-b3c4-04e1623b3012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lf3yhgnkgm27", "content": "", "creation_timestamp": "2025-01-06T20:38:03.263526Z"}, {"uuid": "545db956-8c47-4872-b196-fa0fd00ea52d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/igalog.bsky.social/post/3lf5g5n5ash2a", "content": "", "creation_timestamp": "2025-01-07T10:15:46.307827Z"}, {"uuid": "6d22833a-5260-4e9c-93b0-2eec1bf7526d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/igalog.bsky.social/post/3lf5g5n5ash2a", "content": "", "creation_timestamp": "2025-01-07T10:15:46.314346Z"}, {"uuid": "5387200d-f118-4a62-8e01-b4273312ad4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/honkhase.bsky.social/post/3lfc3ngnivk2y", "content": "", "creation_timestamp": "2025-01-09T06:51:02.669740Z"}, {"uuid": "e6ab64c6-cc1d-495a-a353-5d011c05ef58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/honkhase.bsky.social/post/3lfc3nhfhis2y", "content": "", "creation_timestamp": "2025-01-09T06:51:03.160530Z"}, {"uuid": "6775d7c1-ef53-4bd8-a096-169fba60362a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113763499052520887", "content": "", "creation_timestamp": "2025-01-03T08:33:55.582359Z"}, {"uuid": "acb80684-ded5-4ffd-8eee-56c988365e38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3letavvtbwu2m", "content": "", "creation_timestamp": "2025-01-03T09:15:20.527796Z"}, {"uuid": "221c19d3-fbfb-47d8-b571-040bd098d297", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3letdadnmfj2w", "content": "", "creation_timestamp": "2025-01-03T09:56:58.044333Z"}, {"uuid": "8b680cda-5947-4fbe-8494-591e9675567b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3letdadx3m725", "content": "", "creation_timestamp": "2025-01-03T09:56:58.633598Z"}, {"uuid": "fe07f1a6-429d-45f3-8662-f32da948f298", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lf256yotps23", "content": "", "creation_timestamp": "2025-01-06T02:57:29.235423Z"}, {"uuid": "d864045d-38ff-4913-b3a9-712683c8b90c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lf2f3bobo223", "content": "", "creation_timestamp": "2025-01-06T05:18:36.363226Z"}, {"uuid": "b0aaf31a-be96-4c03-8d36-3c080ebafcd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lf2xgcaamz23", "content": "", "creation_timestamp": "2025-01-06T10:46:52.072052Z"}, {"uuid": "5b53375c-0b15-495b-8713-966325616fe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0002", "content": "", "creation_timestamp": "2025-01-06T06:49:21.000000Z"}, {"uuid": "4c816286-7cd4-44e0-9acb-11cd6bc020a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/youranonriots.bsky.social/post/3lf6vqeiatk2r", "content": "", "creation_timestamp": "2025-01-08T00:27:20.777497Z"}, {"uuid": "0679b528-3316-4540-8741-09f0422d7b5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lf6vqfegmp2j", "content": "", "creation_timestamp": "2025-01-08T00:27:21.478619Z"}, {"uuid": "0b47b41c-3b52-4b05-bd39-b72b3036ee73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3lf7nenhodh2w", "content": "", "creation_timestamp": "2025-01-08T07:30:17.511984Z"}, {"uuid": "a398bd0b-3759-4dfe-9228-906c59fa5b03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://t.me/cvedetector/14215", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9140 - Moxa Cellular Routers and Network Security Appliances OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9140 \nPublished : Jan. 3, 2025, 9:15 a.m. | 42\u00a0minutes ago \nDescription : Moxa\u2019s cellular routers, secure routers, and network security appliances are affected by a critical vulnerability, CVE-2024-9140. This vulnerability allows OS command injection due to improperly restricted commands, potentially enabling attackers to execute arbitrary code. This poses a significant risk to the system\u2019s security and functionality. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T11:09:57.000000Z"}, {"uuid": "6515cdba-a95e-43e2-9ed9-2f2cc5720abf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://t.me/ics_cert/992", "content": "Moxa \u062a\u0627\u06cc\u0648\u0627\u0646 \u0628\u0647 \u0645\u0634\u062a\u0631\u06cc\u0627\u0646 \u062f\u0631 \u0645\u0648\u0631\u062f \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0634\u062f\u062a \u0628\u0627\u0644\u0627 \u0647\u0634\u062f\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f \u06a9\u0647 \u0631\u0648\u062a\u0631\u0647\u0627 \u0648 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0634\u0628\u06a9\u0647\u200c\u0627\u0634 \u0631\u0627 \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc EoP \u0648 \u0641\u0631\u0645\u0627\u0646 \u0634\u0648\u062f.\n\n\u06cc\u06a9\u06cc \u0627\u0632 \u0645\u0634\u06a9\u0644\u0627\u062a \u0628\u0647\u200c\u0639\u0646\u0648\u0627\u0646 CVE-2024-9138 (CVSS 4.0: 8.6) \u0631\u062f\u06cc\u0627\u0628\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u06a9\u062f\u06af\u0630\u0627\u0631\u06cc \u0634\u062f\u0647 \u0633\u062e\u062a \u0627\u0633\u062a\u060c \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06a9\u0627\u0631\u0628\u0631 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0631\u0627 \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0647\u062f \u0648 \u062f\u0633\u062a\u0631\u0633\u06cc \u0633\u0637\u062d \u0631\u06cc\u0634\u0647 \u0628\u0647 \u0633\u06cc\u0633\u062a\u0645 \u0648 \u0647\u0645\u0647 \u0686\u06cc\u0632\u0647\u0627\u06cc\u06cc \u06a9\u0647 \u0646\u0634\u0627\u0646 \u0645\u06cc\u200c\u062f\u0647\u062f \u0628\u0647 \u062f\u0633\u062a \u0622\u0648\u0631\u062f. .\n\n\u06cc\u06a9\u06cc \u062f\u06cc\u06af\u0631 \u0627\u0632 CVE-2024-9140 (CVSS 4.0:9.3) \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc \u062f\u0647\u062f \u062a\u0627 \u0627\u0632 \u06a9\u0627\u0631\u0627\u06a9\u062a\u0631\u0647\u0627\u06cc \u0648\u06cc\u0698\u0647 \u0628\u0631\u0627\u06cc \u062f\u0648\u0631 \u0632\u062f\u0646 \u0645\u062d\u062f\u0648\u062f\u06cc\u062a \u0647\u0627\u06cc \u0648\u0631\u0648\u062f\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u0646\u062f \u06a9\u0647 \u0628\u0647 \u0637\u0648\u0631 \u0628\u0627\u0644\u0642\u0648\u0647 \u0645\u0646\u062c\u0631 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u063a\u06cc\u0631\u0645\u062c\u0627\u0632 \u062f\u0633\u062a\u0648\u0631 \u0645\u06cc \u0634\u0648\u062f.\n\n\u0645\u062d\u0635\u0648\u0644\u0627\u062a \u062a\u062d\u062a \u062a\u0627\u062b\u06cc\u0631 \u0628\u0631\u0627\u06cc CVE-2024-9138 \u0639\u0628\u0627\u0631\u062a\u0646\u062f \u0627\u0632: \u0633\u0631\u06cc EDR-810 (\u0646\u0633\u062e\u0647 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 5.12.37 \u0628\u0647 \u0628\u0639\u062f \u0628\u0631\u0627\u06cc \u0647\u0645\u0647 \u0633\u0631\u06cc \u0647\u0627 \u0627\u0632 \u062c\u0645\u0644\u0647 \u0633\u0631\u06cc \u0647\u0627\u06cc \u0642\u0628\u0644\u06cc)\u060c EDR-8010 (3.13.1)\u060c EDR-G902 (5.7.25)\u060c \u0633\u0631\u06cc EDR - G902 (5.7.25)\u060c EDR-G9004 (3.13.1)\u060c EDR-G9010 (3.13.1)\u060c EDF-G1002-BP (3.13.1)\u060c NAT-102 (1.0.5)\u060c OnCell G4302-LTE4 (3.13) \u0648 TN-4900 (3.13).\n\n\u0637\u0628\u0642 CVE-2024-9140 - \u0633\u0631\u06cc EDR-8010 (3.13.1 \u0648 \u0628\u06cc\u0634\u062a\u0631 \u0628\u0631\u0627\u06cc \u0647\u0645\u0647 \u0633\u0631\u06cc \u0647\u0627 \u0627\u0632 \u062c\u0645\u0644\u0647 \u0633\u0631\u06cc \u0647\u0627\u06cc \u0642\u0628\u0644\u06cc)\u060c EDR-G9004 (3.13.1)\u060c EDR-G9010 (3.13.1)\u060c EDF-G1002-BP ( 3.13 .1)\u060c NAT-102 (1.0.5)\u060c OnCell G4302-LTE4 (3.13) \u0648 TN-4900 (3.13).\n\n\u067e\u0686\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc: EDR-810\u060c EDR-8010\u060c EDR-G902\u060c EDR-G903\u060c EDR-G9004\u060c EDR-G9010 \u0648 EDF-G1002-BP (\u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0645\u06cc\u0627\u0646\u200c\u0627\u0641\u0632\u0627\u0631 \u0628\u0647 \u0646\u0633\u062e\u0647 3.14 \u06cc\u0627 \u0628\u0627\u0644\u0627\u062a\u0631)\u060c NAT-102 (\u0648\u0635\u0644\u0647\u200c\u0646\u0627\u0645\u0647 \u0631\u0633\u0645\u06cc) \u062f\u0631 \u062f\u0633\u062a\u0631\u0633 \u0647\u0633\u062a\u0646\u062f \u0645\u0648\u062c\u0648\u062f \u0646\u06cc\u0633\u062a)\u060c OnCell G4302-LTE4 \u0648 TN-4900 (\u0627\u0632 \u0637\u0631\u06cc\u0642 Moxa Help Desk).\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u06a9\u0627\u0647\u0634\u06cc \u0634\u0627\u0645\u0644 \u0627\u0637\u0645\u06cc\u0646\u0627\u0646 \u0627\u0632 \u0639\u062f\u0645 \u062f\u0633\u062a\u0631\u0633\u06cc \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627 \u0628\u0647 \u0627\u06cc\u0646\u062a\u0631\u0646\u062a\u060c \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc SSH \u0628\u0647 \u0622\u062f\u0631\u0633\u200c\u0647\u0627\u06cc IP \u0648 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u06cc\u0627 \u067e\u0648\u0634\u0634\u200c\u0647\u0627\u06cc TCP \u0648 \u0627\u0646\u062c\u0627\u0645 \u0627\u0642\u062f\u0627\u0645\u0627\u062a\u06cc \u0628\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u062a\u0644\u0627\u0634\u200c\u0647\u0627\u06cc \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0633\u062a.\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2025-01-17T07:24:21.000000Z"}, {"uuid": "44b548cc-521c-4af2-bdba-264eca2a5fa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/991", "content": "\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc\u0627\u0646\u200c\u0627\u0641\u0632\u0627\u0631 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u0634\u0628\u06a9\u0647 Moxa EDR-8010\u060c EDR-G9004\u060c EDR-G9010\u060c EDF-G1002-BP\u060c NAT-102\u060c OnCell G4302-LTE4\u060c TN-4900 \u0628\u0627 \u0639\u062f\u0645 \u0627\u0646\u062c\u0627\u0645 \u0627\u0642\u062f\u0627\u0645\u0627\u062a \u0628\u0631\u0627\u06cc \u062e\u0646\u062b\u06cc\u200c\u0633\u0627\u0632\u06cc \u062e\u0627\u0635 \u0647\u0645\u0631\u0627\u0647 \u0627\u0633\u062a. \u0639\u0646\u0627\u0635\u0631 \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u062f\u0631 \u0641\u0631\u0645\u0627\u0646 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0628\u0627 \u062a\u0632\u0631\u06cc\u0642 \u062f\u0633\u062a\u0648\u0631\u0627\u062a \u062f\u0633\u062a\u06a9\u0627\u0631\u06cc \u0634\u062f\u0647 \u0648\u06cc\u0698\u0647 \u0628\u0647 \u0631\u0627\u0628\u0637 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u0648\u0628 \u062f\u0633\u062a\u06af\u0627\u0647 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\nBDU: 2025-00075\nCVE-2024-9140\n\n\u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u060c \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u062a\u0634\u062e\u06cc\u0635 \u0646\u0641\u0648\u0630 \u0648 \u067e\u06cc\u0634\u06af\u06cc\u0631\u06cc \u0628\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0648 \u067e\u0627\u0633\u062e \u0628\u0647 \u062a\u0644\u0627\u0634 \u0647\u0627 \u0628\u0631\u0627\u06cc \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647 \u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u06cc\u06a9 \u0644\u06cc\u0633\u062a \"\u0633\u0641\u06cc\u062f\" \u0627\u0632 \u0622\u062f\u0631\u0633 \u0647\u0627\u06cc IP \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u0632 \u0637\u0631\u06cc\u0642 SSH \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647 \u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n- \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647 \u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0627\u0631\u062c\u06cc (\u0627\u06cc\u0646\u062a\u0631\u0646\u062a).\n\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc \u0633\u0627\u0632\u0646\u062f\u0647:\nhttps://www.moxa.com/en/support/product-support/security-advisory/mpsa-241155-privilege-escalation-and-os-command-injection-vulnerabilities-in-cellular-routers,-secure-routers ,-and-netwo\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2025-01-17T07:22:45.000000Z"}, {"uuid": "217fff34-f7e6-402b-b555-245aa5c54e72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://t.me/HackerArsenal/780", "content": "\u203c\ufe0f CVE-2024-9140 \u203c\ufe0f\n\nMoxas cellular routers, secure routers, and network security appliances are affected by a critical vulnerability, CVE20249140. This vulnerability allows OS command injection due to improperly restricted commands, potentially enabling attackers to execute arbitrary code. This poses a significant risk to the systems security and functionality.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"National Vulnerability Database\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity_CVEs", "creation_timestamp": "2025-01-03T15:09:56.000000Z"}, {"uuid": "1f983db8-b431-4619-83a8-e9622463991c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://t.me/true_secator/6606", "content": "\u0422\u0430\u0439\u0432\u0430\u043d\u044c\u0441\u043a\u0430\u044f Moxa \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442\u00a0\u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043e \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u0432\u043b\u0438\u044f\u044e\u0449\u0438\u0445 \u043d\u0430 \u0435\u0435 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u044b \u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a EoP \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u043c\u0430\u043d\u0434.\n\n\u041e\u0434\u043d\u0430 \u0438\u0437 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-9138\u00a0(CVSS 4.0: 8,6) \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0436\u0435\u0441\u0442\u043a\u043e \u0437\u0430\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c\u0438 \u0443\u0447\u0435\u0442\u043d\u044b\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u043c\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 root \u0441\u043e \u0432\u0441\u0435\u043c\u0438 \u0432\u044b\u0442\u0435\u043a\u0430\u044e\u0449\u0438\u043c\u0438.\n\n\u0414\u0440\u0443\u0433\u0430\u044f CVE-2024-9140\u00a0(CVSS 4.0: 9,3) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0438\u043c\u0432\u043e\u043b\u044b \u0434\u043b\u044f \u043e\u0431\u0445\u043e\u0434\u0430 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0439 \u0432\u0432\u043e\u0434\u0430, \u0447\u0442\u043e \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u043c\u0430\u043d\u0434.\n\n\u0421\u0440\u0435\u0434\u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 \u0434\u043b\u044f CVE-2024-9138: \u0441\u0435\u0440\u0438\u044f EDR-810 (\u0432\u0435\u0440\u0441\u0438\u044f \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438 5.12.37 \u0438 \u0434\u0430\u043b\u0435\u0435 \u043f\u043e \u0432\u0441\u0435\u043c \u0441\u0435\u0440\u0438\u044f\u043c \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0435), EDR-8010 (3.13.1), EDR-G902 (5.7.25), \u0441\u0435\u0440\u0438\u044f EDR-G902 (5.7.25), EDR-G9004 (3.13.1), EDR-G9010 (3.13.1), EDF-G1002-BP (3.13.1), NAT-102 (1.0.5), OnCell G4302-LTE4 (3.13) \u0438 TN-4900 (3.13).\n\n\u041f\u043e CVE-2024-9140\u00a0- \u0441\u0435\u0440\u0438\u044f EDR-8010 (3.13.1 \u0438 \u0434\u0430\u043b\u0435\u0435 \u043f\u043e \u0432\u0441\u0435\u043c \u0441\u0435\u0440\u0438\u044f\u043c \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0435), EDR-G9004 (3.13.1), EDR-G9010 (3.13.1), EDF-G1002-BP (3.13.1), NAT-102 (1.0.5), OnCell G4302-LTE4 (3.13) \u0438 TN-4900 (3.13).\n\n\u041f\u0430\u0442\u0447\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0434\u043b\u044f: EDR-810, EDR-8010, EDR-G902, EDR-G903, EDR-G9004, EDR-G9010 \u0438 EDF-G1002-BP (\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 3.14 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439), NAT-102 (\u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 \u043f\u0430\u0442\u0447 \u043d\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d), OnCell G4302-LTE4 \u0438 TN-4900 (\u0447\u0435\u0440\u0435\u0437 \u0441\u043b\u0443\u0436\u0431\u0443 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 Moxa).\n\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043c\u0435\u0440 \u043f\u043e \u0441\u043d\u0438\u0436\u0435\u043d\u0438\u044e \u0440\u0438\u0441\u043a\u0430 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0431\u0435\u0434\u0438\u0442\u044c\u0441\u044f, \u0447\u0442\u043e \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043d\u0435 \u0438\u043c\u0435\u044e\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0443, \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043f\u043e SSH \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u043c\u0438 IP-\u0430\u0434\u0440\u0435\u0441\u0430\u043c\u0438 \u0438 \u0441\u0435\u0442\u044f\u043c\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430 \u0438\u043b\u0438 TCP-\u043e\u0431\u043e\u043b\u043e\u0447\u0435\u043a, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u043d\u044f\u0442\u044c \u043c\u0435\u0440\u044b \u043f\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044e \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.", "creation_timestamp": "2025-01-10T11:35:53.000000Z"}, {"uuid": "695fc1c9-eeba-4ee9-a822-d74ca1b11a80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9140", "type": "seen", "source": "https://t.me/thehackernews/6120", "content": "\ud83d\udea8 Two vulnerabilities (CVE-2024-9138, CVE-2024-9140) impact Moxa's routers, with CVSS scores of 8.6 and 9.3\u2014allowing root access and unauthorized command execution.\n\n\ud83d\udd11 Patch to version 3.14+ immediately.\n\nYou can protect your network by:\n\ud83d\uded1 Isolating devices from the internet.\n\ud83d\udd17 Limiting SSH access to trusted IPs.\n\ud83d\udee1 Enabling strict firewall rules.\n\n\u27a1\ufe0f Find out now: https://thehackernews.com/2025/01/moxa-alerts-users-to-high-severity.html", "creation_timestamp": "2025-01-07T09:11:01.000000Z"}]}