MOXA NPort IAW5000A-I/O Series
The NPort IAW5000A-I/O Series firmware versions 2.1 and earlier contain multiple authentication and authorization flaws. Vulnerabilities include: session hijacking due to improper session management (CWE-384); privilege escalation allowing users to perform administrative actions (CWE-269); use of weak passwords without enforcement (CWE-521); transmission of credentials in cleartext (CWE-319); insufficient brute-force protection on authentication (CWE-307); and information disclosure allowing access to sensitive data without authorization (CWE-200). These flaws could collectively allow an unauthenticated attacker on the network to gain administrative control of the device and all connected serial-based equipment.
- Network access to the NPort device (HTTP, SSH, or Telnet ports)
- The device must be reachable from an attacker's network position
- Weak default or user-set credentials may be present
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1d03769b-bce0-4b5c-86bb-bdd39b13a24b