Moxa IKS, EDS (Update A)
Moxa IKS-G6824A, EDS-408A, EDS-510A, and EDS-405A industrial switches and edge devices contain multiple vulnerabilities including buffer overflow, cross-site request forgery (CSRF), weak session ID generation, authentication bypass, and weak cryptography. These flaws allow unauthenticated attackers to read sensitive configuration data, execute arbitrary commands, alter device settings, capture session data, cause device reboot or crash, or achieve full device compromise. Affected firmware versions: IKS-G6824A (≤5.6), EDS series (≤3.8).
- Network access to the device's web interface or network services (ports commonly 80/443 or Modbus TCP)
- No valid credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4120bd7e-93c2-4192-9229-3fe21740f0cdGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.