
Moxa, a leading provider of industrial networking and communication solutions, has issued a critical security advisory regarding a vulnerability affecting multiple models of its PT switches. The vulnerability, identified as CVE-2024-12297, could allow attackers to bypass authentication mechanisms and gain unauthorized access to devices.
The vulnerability stems from flaws in the authorization mechanism of the affected PT switches. Despite client-side and back-end server verification, attackers can exploit weaknesses in its implementation. This vulnerability may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.
The potential impact of this vulnerability is significant, as successful exploitation could allow attackers to gain unauthorized access to sensitive configurations or disrupt services. The vulnerability has been assigned a CVSS 4.0 base score of 9.2, indicating a critical severity level.
The following Moxa PT switch series and firmware versions are affected by this vulnerability:
- PT-508 Series (Firmware version 3.8 and earlier)
- PT-510 Series (Firmware version 3.8 and earlier)
- PT-7528 Series (Firmware version 5.0 and earlier)
- PT-7728 Series (Firmware version 3.9 and earlier)
- PT-7828 Series (Firmware version 4.0 and earlier)
- PT-G503 Series (Firmware version 5.3 and earlier)
- PT-G510 Series (Firmware version 6.5 and earlier)
- PT-G7728 Series (Firmware version 6.5 and earlier)
- PT-G7828 Series (Firmware version 6.5 and earlier)
Moxa has developed security patches to address this vulnerability for all affected products. Users are strongly advised to contact Moxa Technical Support to obtain the necessary patches and apply them to their devices as soon as possible.
In addition to patching, Moxa recommends the following measures to mitigate the risk associated with this vulnerability:
- Change default passwords to strong, unique passwords.
- Regularly update firmware to the latest versions.
- Implement network segmentation to limit access to critical devices.
- Monitor network traffic for suspicious activity.
Related Posts:
- CVE-2024-1086: Linux Kernel Vulnerability Impacts Numerous Moxa Products
- CVE-2024-7695: Moxa Patches Critical Denial-of-Service Vulnerability in PT Switches
- Moxa PT Switches Vulnerable to CVE-2024-9404 Denial-of-Service Attack
- CVE-2024-9137 (CVSS 9.4) in Moxa’s Cellular Routers and Security Appliances: Immediate Patching Required