CVE-2023-4229

ioLogik 4000 Series: Session Headers Not Implemented

Description

A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, potentially exposing users to security risks. This vulnerability may allow attackers to trick users into interacting with malicious content, leading to unintended actions or unauthorized data disclosures.

Remediation

Solution:

  • Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below. * ioLogik 4000 Series (ioLogik E4200): Please contact Moxa Technical Support for the security patch.

Category

4.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.12%
Vendor Advisory moxa.com
Affected: Moxa ioLogik 4000 Series
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-4229?
CVE-2023-4229 has been scored as a medium severity vulnerability.
How to fix CVE-2023-4229?
To fix CVE-2023-4229: Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below. * ioLogik 4000 Series (ioLogik E4200): Please contact Moxa Technical Support for the security patch.
Is CVE-2023-4229 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-4229 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-4229?
CVE-2023-4229 affects Moxa ioLogik 4000 Series.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.