Moxa ioLogik 4000 Series Multiple Web Server Vulnerabilities and Improper Access Control Vulnerability
The ioLogik E4200 firmware v1.6 and prior contains multiple web server misconfigurations and an improper access control issue. Specifically: an exposed unauthorized service allows direct access without authentication (CVE-2023-4227); session cookies lack HttpOnly flag protection enabling session hijacking (CVE-2023-4228); missing security headers allow UI frame manipulation (CVE-2023-4229); and server banner leaks sensitive version information (CVE-2023-4230). These weaknesses could allow attackers to compromise the web service, steal credentials, or gain unauthorized administrative access to the device.
- Network access to the ioLogik 4000 web server (typically port 80/443)
- For session hijacking: ability to capture HTTP traffic or trick a user into accessing the device
- For unauthorized service exploitation: network reachability to the device on the local network or via a firewall gap
Patching may require device reboot — plan for process interruption
/api/v1/advisories/aa5b30ed-bfe3-4cab-862b-aee5a15f46e2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.