Metrics
Affected Vendors & Products
No advisories yet.
Solution
Moxa has developed appropriate solutions to address these vulnerabilities. Please refer to https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257421-cve-2025-1679,-cve-202... https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257421-cve-2025-1679,-cve-2025-1680-stored-cross-site-scripting-(xss)-and-host-header-injection-vulnerabilities-in
Workaround
No workaround given by the vendor.
Fri, 24 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Moxa
Moxa tn-4500a Moxa tn-5500a Moxa tn-g4500 Moxa tn-g6500 |
|
| Vendors & Products |
Moxa
Moxa tn-4500a Moxa tn-5500a Moxa tn-g4500 Moxa tn-g6500 |
Thu, 23 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Oct 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cross-site Scripting has been identified in Moxa’s Ethernet switches, which allows an authenticated administrative attacker to inject malicious scripts to an affected device’s web service that could impact authenticated users interacting with the device’s web interface. This vulnerability is classified as stored cross-site scripting (XSS); attackers inject malicious scripts into the system, and the scripts persist across sessions. There is no impact to the confidentiality, integrity, and availability of the affected device; no loss of availability within any subsequent systems but has some loss of confidentiality and integrity within the subsequent system. | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-10-23T14:37:22.233Z
Reserved: 2025-02-25T08:08:17.451Z
Link: CVE-2025-1679
Updated: 2025-10-23T14:37:13.604Z
Status : Received
Published: 2025-10-23T14:15:35.653
Modified: 2025-10-23T14:15:35.653
Link: CVE-2025-1679
No data.
OpenCVE Enrichment
Updated: 2025-10-24T10:16:59Z