Moxa CVE-2024-12297: Frontend Authorization Logic Disclosure Vulnerability in Ethernet Switches
Multiple Moxa Ethernet switches contain an authentication bypass vulnerability (CVE-2024-12297) caused by flaws in the authorization mechanism implementation. Despite client-side and back-end server verification present in the design, the implementation is flawed. Attackers can exploit weaknesses in the authorization logic (reliance on security through obscurity) to either brute-force valid credentials or forge MD5 authentication hashes, gaining unauthorized administrative access to the device. This allows potential compromise of device configuration, network traffic manipulation, and service disruption. The vendor has indicated no patch is planned for this vulnerability.
- Network access to the switch's management interface (typically HTTP/HTTPS port 80 or 443)
- No valid credentials required to initiate the attack
Patching may require device reboot — plan for process interruption
/api/v1/advisories/beb60352-3153-4538-ad3c-def08b8854b4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.