First published: Thu Aug 24 2023(Updated: )
A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, where the session cookies attribute is not set properly in the affected application. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.
Credit: psirt@moxa.com psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Iologik E4200 Firmware | <=1.6 | |
Moxa Iologik E4200 | ||
All of | ||
Moxa Iologik E4200 Firmware | <=1.6 | |
Moxa Iologik E4200 |
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below. * ioLogik 4000 Series (ioLogik E4200): Please contact Moxa Technical Support for the security patch.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this ioLogik 4000 Series firmware vulnerability is CVE-2023-4228.
The severity level of CVE-2023-4228 is medium, with a CVSS score of 4.3.
The affected versions of the ioLogik 4000 Series firmware are v1.6 and prior.
CVE-2023-4228 may lead to security risks, potentially exposing user session data to unauthorized access.
Moxa has released a security advisory with recommendations on how to mitigate the vulnerabilities. Please refer to the Moxa website for more information.