First published: Wed Jan 15 2025(Updated: )
Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.
Credit: psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Ethernet Switch |
Moxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below. * EDS-508A Series: Please contact Moxa Technical Support for the security patch * PT Series: Please contact Moxa Technical Support for the security patch
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12297 is classified as a high severity vulnerability due to its potential for unauthorized access.
To fix CVE-2024-12297, update the Moxa Ethernet Switch EDS-508A Series firmware to a version later than 3.11.
CVE-2024-12297 is an authentication bypass vulnerability that affects the authorization process of the device.
CVE-2024-12297 affects the Moxa Ethernet switch EDS-508A Series running firmware version 3.11 and earlier.
Yes, an attacker exploiting CVE-2024-12297 can gain unauthorized access, potentially leading to further exploitation of the network.