First published: Sat Dec 23 2023(Updated: )
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. An attacker can exploit this vulnerability to trick a client into making an unintentional request to the web server, which will be treated as an authentic request. This vulnerability may lead an attacker to perform operations on behalf of the victimized user.
Credit: psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Moxa Iologik E1210 Firmware | <3.3 | |
Moxa ioLogik E1210 | ||
All of | ||
Moxa Iologik E1211 Firmware | <3.3 | |
Moxa Iologik E1211 | ||
All of | ||
Moxa Iologik E1212 Firmware | <3.3 | |
Moxa Iologik E1212 | ||
All of | ||
Moxa Iologik E1213 Firmware | <3.3 | |
Moxa Iologik E1213 | ||
All of | ||
Moxa Iologik E1214 Firmware | <3.3 | |
Moxa Iologik E1214 | ||
All of | ||
Moxa Iologik E1240 Firmware | <3.3 | |
Moxa Iologik E1240 | ||
All of | ||
Moxa Iologik E1241 Firmware | <3.3 | |
Moxa Iologik E1241 | ||
All of | ||
Moxa Iologik E1242 Firmware | <3.3 | |
Moxa Iologik E1242 | ||
All of | ||
Moxa Iologik E1260 Firmware | <3.3 | |
Moxa Iologik E1260 | ||
All of | ||
Moxa Iologik E1262 Firmware | <3.3 | |
Moxa Iologik E1262 |
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below. * ioLogik E1200 Series : Please contact Moxa Technical Support for the security patch (v3.3.7). https://www.moxa.com/tw/support/technical-support
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.