Moxa CVE-2024-12297: Frontend Authorization Logic Disclosure Vulnerability in EDS-508A Series
Moxa EDS-508A Series Ethernet switches running firmware version 3.11 and earlier contain a flawed authorization mechanism that allows attackers to bypass authentication through brute-force attacks or MD5 collision attacks. The vulnerability stems from reliance on security through obscurity (CWE-656) and insufficient back-end verification of authentication credentials. Successful exploitation grants an attacker unauthorized access to device configuration, potentially allowing modification of network settings or service disruption. The vulnerability requires network access and is unauthenticated.
- Network access to the EDS-508A device management port (typically Ethernet/IP-based management interface)
- Device is running firmware version 3.11 or earlier
- Management interface is accessible from the attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f0f832b6-5795-4d91-866b-df49f79c6a34Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.