CVE-2026-1632
MOMA · Seismic Station
MOMA Seismic Station exposes its web management interface without authentication, allowing unauthenticated attackers to modify configurations, steal data, or reset the device remotely.
Executive summary
MOMA Seismic Station devices suffer from a critical authentication bypass vulnerability that grants unauthenticated attackers full control over device configurations and sensitive data.
Vulnerability
The web management interface of the MOMA Seismic Station lacks any authentication requirements. This allows an unauthenticated, remote attacker to access the administrative dashboard directly.
Business impact
The exposure of critical infrastructure management interfaces leads to significant operational risks. Attackers can modify seismic monitoring parameters, exfiltrate proprietary device data, or perform a factory reset, resulting in total loss of monitoring capabilities and data integrity. The CVSS score of 9.1 reflects the high impact on availability and confidentiality for industrial monitoring environments.
Remediation
Immediate Action: Update the device firmware to the latest version provided by the vendor and ensure the web interface is placed behind a secure VPN or firewall.
Proactive Monitoring: Monitor network traffic for unauthorized access to the management IP address and review device logs for unexpected configuration changes or reset commands.
Compensating Controls: Restrict access to the management interface using Access Control Lists (ACLs) to ensure only authorized administrative workstations can communicate with the device.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Organizations using MOMA Seismic Stations must immediately isolate these devices from the public internet. The primary remediation is to apply the latest firmware patches and enforce strict network-level authentication. Immediate action is required to prevent unauthorized physical or logical disruption of seismic data collection.