Metrics
Affected Vendors & Products
No advisories yet.
Solution
Moxa has developed appropriate solutions to address the vulnerability. Please refer to https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258121-cve-2025-6892,-cve-202... https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258121-cve-2025-6892,-cve-2025-6893,-cve-2025-6894,-cve-2025-6949,-cve-2025-6950-multiple-vulnerabilities-in-netwo
Workaround
No workaround given by the vendor.
Fri, 17 Oct 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An Incorrect Authorization vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in the API authentication mechanism allows unauthorized access to protected API endpoints, including those intended for administrative functions. This vulnerability can be exploited after a legitimate user has logged in, as the system fails to properly validate session context or privilege boundaries. An attacker may leverage this flaw to perform unauthorized privileged operations. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems. | |
Weaknesses | CWE-863 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-10-17T02:07:25.796Z
Reserved: 2025-06-28T15:51:35.946Z
Link: CVE-2025-6892

No data.

Status : Received
Published: 2025-10-17T02:15:52.997
Modified: 2025-10-17T02:15:52.997
Link: CVE-2025-6892

No data.

No data.