Article Details

Scrape Timestamp (UTC): 2025-03-11 06:52:52.523

Source: https://thehackernews.com/2025/03/moxa-issues-fix-for-critical.html

Original Article Text

Click to Toggle View

Moxa Issues Fix for Critical Authentication Bypass Vulnerability in PT Switches. Taiwanese company Moxa has released a security update to address a critical security flaw impacting its PT switches that could permit an attacker to bypass authentication guarantees. The vulnerability, tracked as CVE-2024-12297, has been assigned a CVSS v4 score of 9.2 out of a maximum of 10.0. "Multiple Moxa PT switches are vulnerable to an authentication bypass because of flaws in their authorization mechanism," the company said in an advisory released last week. "Despite client-side and back-end server verification, attackers can exploit weaknesses in its implementation. This vulnerability may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device." Successful exploitation of the shortcoming, in other words, could lead to an authentication bypass and allow an attacker to gain unauthorized access to sensitive configurations or disrupt services. The flaw impacts the following versions - Patches for the vulnerability can be obtained by contacting the Moxa Technical Support team. The company credited Artem Turyshev from Moscow-based Rosatom Automated Control Systems (RASU) for reporting the vulnerability. Outside apply the latest fixes, companies using the affected products are recommended to restrict network access using firewalls or access control lists (ACLs), enforce network segmentation, minimize direct exposure to the internet, implement multi-factor authentication (MFA) for accessing critical systems, enable event logging, and monitor network traffic and device behavior for unusual activities. It's worth noting that Moxa resolved the same vulnerability in the Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, back in mid-January 2025. The development comes a little over two months after Moxa rolled out patches for two security vulnerabilities impacting its cellular routers, secure routers, and network security appliances (CVE-2024-9138 and CVE-2024-9140) that could allow privilege escalation and command execution. Last month, it also addressed multiple high-severity flaws affecting various switches (CVE-2024-7695, CVE-2024-9404, and CVE-2024-9137) that could result in a denial-of-service (DoS) attack, or command execution.

Daily Brief Summary

MALWARE // Moxa Issues Critical Patch for Authentication Bypass in PT Switches

Taiwanese company Moxa has released a security update to fix a critical vulnerability in its PT switches, allowing authentication bypass.

The flaw, identified as CVE-2024-12297, received a high-severity CVSS v4 score of 9.2, indicating significant risk.

Attackers could exploit the vulnerability to perform brute-force attacks or MD5 collision attacks to compromise device security.

Affected Moxa PT switch versions require users to contact Moxa Technical Support for patching.

Recommendations for mitigating risks include using firewalls, network segmentation, multi-factor authentication, event logging, and monitoring for unusual network activities.

Moxa also recently patched similar critical vulnerabilities in its Ethernet switches and other network devices, highlighting ongoing security efforts.

The discovery of the vulnerability was credited to Artem Turyshev of Rosatom Automated Control Systems (RASU).