First published: Thu Aug 24 2023(Updated: )
A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which has the potential to facilitate the collection of information on ioLogik 4000 Series devices. This vulnerability may enable attackers to gather information for the purpose of assessing vulnerabilities and potential attack vectors.
Credit: psirt@moxa.com psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Iologik E4200 Firmware | <=1.6 | |
Moxa Iologik E4200 | ||
All of | ||
Moxa Iologik E4200 Firmware | <=1.6 | |
Moxa Iologik E4200 |
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below. * ioLogik 4000 Series (ioLogik E4200): Please contact Moxa Technical Support for the security patch.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-4230 is medium with a CVSS score of 5.3.
The ioLogik 4000 Series devices with firmware versions up to and including v1.6 are affected by CVE-2023-4230.
Attackers can exploit CVE-2023-4230 to collect information on ioLogik 4000 Series devices.
CVE-2023-4230 is associated with CWE IDs 668 and 200.
You can find more information about CVE-2023-4230 at the following link: [CVE-2023-4230](https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230310-iologik-4000-series-multiple-web-server-vulnerabilities-and-improper-access-control-vulnerability)