Moxa Multiple Moxa Ethernet Switches Affected by CVE-2023-48795 and CVE-2019-20372
Multiple Moxa Ethernet switches are vulnerable to two integrity and authentication bypass issues: CVE-2023-48795 (CVSS 5.9): Improper validation of integrity checks allows a remote, man-in-the-middle attacker to bypass integrity verification and downgrade connection security. This requires network position on the path between the administrator and the switch. CVE-2019-20372 (CVSS 5.3): HTTP request smuggling allows bypassing authentication controls on the web management interface, potentially leading to unauthorized access to web pages and further attacks. This requires network access to the switch's web interface. Both vulnerabilities are unauthenticated and remotely exploitable. Moxa has not released patches for affected switch models.
- Network position allowing man-in-the-middle (same subnet or compromised router)
- Ability to intercept or redirect HTTPS traffic to the affected switch
- For HTTP smuggling: network path to the switch's web management interface
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e6b6626a-6ee4-4df3-8806-e785f7a1e21d