CVE-2024-12297

Frontend Authorization Logic Disclosure Vulnerability

Description

Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.

Remediation

Solution:

  • Moxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below. * EDS-508A Series: Please contact Moxa Technical Support for the security patch * PT Series: Please contact Moxa Technical Support for the security patch

Workaround:

  • * Minimize network exposure to ensure the device is not accessible from the Internet. * Limit SSH access to trusted IP addresses and networks using firewall rules or TCP wrappers. * Implement IDS or Intrusion Prevention System (IPS) to detect and prevent exploitation attempts. These systems can provide an additional layer of defense by monitoring network traffic for signs of attacks.

Category

9.2
CVSS
Severity: Critical
CVSS 4.0 •
EPSS 0.19%
Vendor Advisory moxa.com Vendor Advisory moxa.com
Affected: Moxa EDS-508A Series
Affected: Moxa PT-508 Series
Affected: Moxa PT-510 Series
Affected: Moxa PT-7528 Series
Affected: Moxa PT-7728 Series
Affected: Moxa PT-7828 Series
Affected: Moxa PT-G503 Series
Affected: Moxa PT-G510 Series
Affected: Moxa PT-G7728 Series
Affected: Moxa PT-G7828 Series
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-12297?
CVE-2024-12297 has been scored as a critical severity vulnerability.
How to fix CVE-2024-12297?
To fix CVE-2024-12297: Moxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below. * EDS-508A Series: Please contact Moxa Technical Support for the security patch * PT Series: Please contact Moxa Technical Support for the security patch
Is CVE-2024-12297 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-12297 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-12297?
CVE-2024-12297 affects Moxa EDS-508A Series, Moxa PT-508 Series, Moxa PT-510 Series, Moxa PT-7528 Series, Moxa PT-7728 Series, Moxa PT-7828 Series, Moxa PT-G503 Series, Moxa PT-G510 Series, Moxa PT-G7728 Series, Moxa PT-G7828 Series.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.