Security Enhancement: Modbus/TCP Device Identification

Published: October 21, 2025

This Alert Is From MOXA

As Industrial IoT (IIoT) adoption continues to proliferate, cybersecurity has become one of the top priorities. The Moxa Product Security Incident Response Team (PSIRT) takes a proactive approach to protect products from cybersecurity vulnerabilities. Moxa PSIRT investigates all reports of vulnerabilities that could potentially affect Moxa products. Moxa created a vulnerability management policy to provide guidance and information to our customers in the event of a reported vulnerability. The management policy ensures that Moxa’s customers have steady, unambiguous resources to help them understand how Moxa resolves or mitigates reported vulnerabilities. For any queries, please email PSIRT@moxa.com.

It is possible to send a Modbus Encapsulated Interface read request with MEI type 14 to get the device's Vendor Name, Product Code, and Major and Minor Revision. If supported, the data can include Vendor URL, Product Name, Model Name, and User Application Name. The alternative is to detect Modbus on valid error responses from a device not supporting the function code 43 and MEI 14. (Source: Tenable Nessus)

As this issue is assessed as medium severity, users may evaluate their environment and schedule the update in the next maintenance or update cycle.

 

This alert has come from: https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257316-security-enhancement-modbus-tcp-device-identification