First published: Thu Aug 17 2023(Updated: )
TN-5900 Series firmware version v3.3 and prior is vulnerable to improper-authentication vulnerability. This vulnerability arises from inadequate authentication measures implemented in the web API handler, allowing low-privileged APIs to execute restricted actions that only high-privileged APIs are allowed This presents a potential risk of unauthorized exploitation by malicious actors.
Credit: psirt@moxa.com psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Tn-5900 Firmware | <=3.3 | |
Moxa TN-5900 | ||
All of | ||
Moxa Tn-5900 Firmware | <=3.3 | |
Moxa TN-5900 |
Moxa has developed appropriate solution to address the vulnerability. The solution for affected products is shown below: * TN-5900 Series: Please upgrade to firmware v3.4 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-33237.
The severity of CVE-2023-33237 is high with a severity value of 8.8.
TN-5900 Series firmware version v3.3 and prior are affected by CVE-2023-33237.
CVE-2023-33237 occurs due to inadequate authentication measures implemented in the web API handler of TN-5900 Series firmware version v3.3 and prior.
Please refer to the Moxa Security Advisory for remediation steps and firmware updates for CVE-2023-33237.