First published: Wed Jan 29 2025(Updated: )
Multiple switches are affected by an out-of-bounds write vulnerability. This vulnerability is caused by insufficient input validation, which allows data to be written to memory outside the bounds of the buffer. Successful exploitation of this vulnerability could result in a denial-of-service attack. This vulnerability poses a significant remote threat if the affected products are exposed to publicly accessible networks. Attackers could potentially disrupt operations by shutting down the affected systems. Due to the critical nature of this security risk, we strongly recommend taking immediate action to prevent its potential exploitation.
Credit: psirt@moxa.com
Moxa has developed appropriate solutions to address this vulnerability. The solutions for affected products are listed in the following: * PT-7728 Series, PT-7828 Series, PT-G503 Series, PT-G510 Series: Please contact Moxa Technical Support https://www.moxa.com/support/support/technical-support for the security patch * PT-G7728 Series: Upgrade to the firmware version 6.5 https://www.moxa.com/en/products/industrial-network-infrastructure/ethernet-switches/rackmount-switches/pt-g7728-series#resources or later * PT-G7828 Series: Upgrade to the firmware version 6.5 https://www.moxa.com/en/products/industrial-network-infrastructure/ethernet-switches/rackmount-switches/pt-g7828-series#resources or later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.