Metrics
Affected Vendors & Products
No advisories yet.
Solution
Moxa has developed appropriate solutions to address the vulnerability. Please refer to https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258121-cve-2025-6892,-cve-202... https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258121-cve-2025-6892,-cve-2025-6893,-cve-2025-6894,-cve-2025-6949,-cve-2025-6950-multiple-vulnerabilities-in-netwo
Workaround
No workaround given by the vendor.
Fri, 17 Oct 2025 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An Use of Hard-coded Credentials vulnerability has been identified in Moxa’s network security appliances and routers. The system employs a hard-coded secret key to sign JSON Web Tokens (JWT) used for authentication. This insecure implementation allows an unauthenticated attacker to forge valid tokens, thereby bypassing authentication controls and impersonating any user. Exploitation of this vulnerability can result in complete system compromise, enabling unauthorized access, data theft, and full administrative control over the affected device. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems. | |
Weaknesses | CWE-798 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-10-17T03:19:48.223Z
Reserved: 2025-07-01T05:10:28.304Z
Link: CVE-2025-6950

No data.

Status : Received
Published: 2025-10-17T04:16:14.893
Modified: 2025-10-17T04:16:14.893
Link: CVE-2025-6950

No data.

No data.