Moxa Multiple Moxa Ethernet Switches Affected by CVE-2023-48795 and CVE-2019-20372
Multiple Moxa Ethernet switches are affected by two vulnerabilities: CVE-2023-48795 (improper validation of integrity check values) and CVE-2019-20372 (HTTP request/response smuggling). CVE-2023-48795 allows a remote man-in-the-middle attacker to bypass integrity checks and downgrade connection security, potentially modifying network traffic in transit. CVE-2019-20372 allows HTTP request smuggling to the web management interface, enabling unauthorized access to web pages, bypassing security controls, and potential for further attacks. Both vulnerabilities are remotely exploitable without authentication. No firmware patches are available from Moxa for affected switch models.
- Network access to the Moxa switch (Layer 2 or 3 adjacency, or man-in-the-middle capability on the network path)
- For CVE-2019-20372: access to the web management interface (TCP port 80/443, depending on configuration)
- For CVE-2023-48795: ability to intercept and modify transit traffic
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e6b6626a-6ee4-4df3-8806-e785f7a1e21dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.