Saturday, March 15, 2025

Important Vulnerabilities in Moxa Switches Allow Unauthorized Entry


A essential vulnerability recognized as CVE-2024-12297 has been found in Moxa’s PT sequence of community switches, affecting a number of fashions throughout completely different product strains.

This safety flaw entails an authorization logic disclosure that may be exploited to bypass authentication mechanisms, permitting malicious actors to realize unauthorized entry to delicate configurations, doubtlessly disrupting community providers.

The vulnerability, labeled as CWE-656: Reliance on Safety By way of Obscurity, allows attackers to bypass client-side and backend server verification processes regardless of present safety measures.

Exploitation can result in brute-force assaults geared toward guessing legitimate credentials or leveraging MD5 collision assaults to forge authentication hashes, thereby compromising machine safety.

Recognized Vulnerability Kind and Potential Influence

Merchandise Vulnerability Kind Influence
1 CWE-656: Reliance on Safety By way of Obscurity (CVE-2024-12297) Exploitation may permit attackers to bypass authentication, carry out brute-force or MD5 collision assaults, and acquire unauthorized entry to delicate configurations or disrupt providers.

The vulnerability recognized in Moxa’s PT switches, CVE-2024-12297, carries important severity. Its scoring particulars spotlight the essential nature of this risk.

In response to the Frequent Vulnerability Scoring System (CVSS) model 4.0, this vulnerability has a base rating of 9.2, indicating excessive severity. The vector for this rating is AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L.

This breaks down into varied elements similar to Assault Vector (AV), Assault Complexity (AC), and Privileges Required (PR). Particularly, an attacker can exploit this vulnerability remotely (AV:N) with low complexity (AC:L), requiring no person interplay (UI:N), and no privileges (PR:N).

The vulnerability permits excessive potential affect when it comes to confidentiality, integrity, and availability (VC, VI, VA all set to Excessive), however the scope for altering these impacts is restricted (SC:L).

The affect on system integrity and availability can be restricted (SI:L), and there’s no important scope for amplifying these impacts (SA:L).

Affected Merchandise and Options

Affected Merchandise

Product Sequence Affected Variations
PT-508 Sequence Firmware model 3.8 and earlier
PT-510 Sequence Firmware model 3.8 and earlier
PT-7528 Sequence Firmware model 5.0 and earlier
PT-7728 Sequence Firmware model 3.9 and earlier
PT-7828 Sequence Firmware model 4.0 and earlier
PT-G503 Sequence Firmware model 5.3 and earlier
PT-G510 Sequence Firmware model 6.5 and earlier
PT-G7728 Sequence Firmware model 6.5 and earlier
PT-G7828 Sequence Firmware model 6.5 and earlier

Along with making use of the product-specific options, customers are suggested to observe common safety suggestions to boost the safety posture of their networks.

Common updates and checks for patches are essential in stopping the exploitation of such vulnerabilities.

This advisory serves as a name to motion for each Moxa and its prospects to make sure well timed mitigation of the recognized dangers, defending towards potential malicious actions.

Customers of the affected Moxa merchandise ought to prioritize contacting Moxa Technical Assist to acquire the required safety patches.

Are you from SOC/DFIR Groups? – Analyse Malware Incidents & get stay Entry with ANY.RUN -> Begin Now for Free.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com