Moxa PT-7528 and PT-7828 Series Ethernet Switches Vulnerabilities
Multiple vulnerabilities were identified in Moxa PT-7528 and PT-7828 Series Ethernet Switches: (1) Stack-based buffer overflow (CVE-2020-6989) allowing arbitrary code execution or denial of service; (2) Weak or risky cryptographic algorithms (CVE-2020-6987) enabling confidential information disclosure; (3) Hardcoded cryptographic keys (CVE-2020-6983) increasing risk of data recovery; (4) Hardcoded or default passwords (CVE-2020-6985) allowing unauthenticated access; (5) Weak password requirements (CVE-2020-6995) enabling brute-force attacks; (6) Information exposure via zero-day attack vectors (CVE-2020-6993). PT-7528 Series has no fix available. PT-7828 Series fixes are available.
- Network access to the PT-7528 or PT-7828 management or data plane (Layer 2/3 connectivity)
- Knowledge of hardcoded or weak default credentials on the device
- Ability to send crafted network packets to trigger buffer overflow
- No authentication required for some information disclosure paths
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bd7cc1db-3689-4ada-97f0-59274aeb1fcb