First published: Thu Aug 24 2023(Updated: )
A vulnerability has been identified in the ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which can be exploited by malicious actors to potentially gain unauthorized access to the product. This could lead to security breaches, data theft, and unauthorized manipulation of sensitive information. The vulnerability is attributed to the presence of an unauthorized service, which could potentially enable unauthorized access to the. device.
Credit: psirt@moxa.com psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Iologik E4200 Firmware | <=1.6 | |
Moxa Iologik E4200 | ||
All of | ||
<=1.6 | ||
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below. * ioLogik 4000 Series (ioLogik E4200): Please contact Moxa Technical Support for the security patch.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4227 is a vulnerability in the ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which can be exploited by malicious actors to potentially gain unauthorized access to the product.
CVE-2023-4227 can be exploited by malicious actors to potentially gain unauthorized access to the ioLogik 4000 Series (ioLogik E4200) product.
The potential impacts of CVE-2023-4227 include security breaches, data theft, and unauthorized manipulation of sensitive information.
CVE-2023-4227 has a severity level of medium with a CVSS score of 6.5.
To fix CVE-2023-4227, it is recommended to update the ioLogik 4000 Series (ioLogik E4200) firmware to a version higher than v1.6.