Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.
History

Wed, 15 Jan 2025 10:15:00 +0000

Type Values Removed Values Added
Description Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.
Title Frontend Authorization Logic Disclosure Vulnerability
Weaknesses CWE-656
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Moxa

Published: 2025-01-15T10:00:46.524Z

Updated: 2025-01-15T10:00:46.524Z

Reserved: 2024-12-06T04:02:40.742Z

Link: CVE-2024-12297

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-01-15T10:15:07.237

Modified: 2025-01-15T10:15:07.237

Link: CVE-2024-12297

cve-icon Redhat

No data.