Metrics
Affected Vendors & Products
Solution
Moxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below. * EDS-508A Series: Please contact Moxa Technical Support for the security patch * PT Series: Please contact Moxa Technical Support for the security patch
Workaround
* Minimize network exposure to ensure the device is not accessible from the Internet. * Limit SSH access to trusted IP addresses and networks using firewall rules or TCP wrappers. * Implement IDS or Intrusion Prevention System (IPS) to detect and prevent exploitation attempts. These systems can provide an additional layer of defense by monitoring network traffic for signs of attacks.
Thu, 06 Mar 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device. | Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device. |
References |
|
Wed, 15 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 15 Jan 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device. | |
Title | Frontend Authorization Logic Disclosure Vulnerability | |
Weaknesses | CWE-656 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-03-06T08:27:52.297Z
Reserved: 2024-12-06T04:02:40.742Z
Link: CVE-2024-12297

Updated: 2025-01-15T14:49:17.747Z

Status : Awaiting Analysis
Published: 2025-01-15T10:15:07.237
Modified: 2025-03-06T09:15:25.380
Link: CVE-2024-12297

No data.

No data.