Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Jan 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device. | |
Title | Frontend Authorization Logic Disclosure Vulnerability | |
Weaknesses | CWE-656 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: Moxa
Published: 2025-01-15T10:00:46.524Z
Updated: 2025-01-15T10:00:46.524Z
Reserved: 2024-12-06T04:02:40.742Z
Link: CVE-2024-12297
Vulnrichment
No data.
NVD
Status : Received
Published: 2025-01-15T10:15:07.237
Modified: 2025-01-15T10:15:07.237
Link: CVE-2024-12297
Redhat
No data.