Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Jack Dorsey is working on the Bluetooth messaging app, Bitchat

The SEO addiction campaign targets over 8,500 SMB users with malware disguised as AI tools

Threads are approaching X’s daily app users, new data shows

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » MOXA Issues Critical Authentication Fixes PT Switch Vulnerability Bypass
Identity

MOXA Issues Critical Authentication Fixes PT Switch Vulnerability Bypass

userBy userMarch 11, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 11, 2025Ravi LakshmananICS Security/Vulnerabilities

MOXA Issues Critical Authentication Fixes PT Switch Vulnerability Bypass

Taiwanese company Moxa has released a security update to address critical security flaws affecting PT switches that allow attackers to bypass authentication guarantees.

The vulnerability tracked as CVE-2024-12297 is assigned a CVSS V4 score of 9.2 out of 10.0.

“Several MOXA PT switches are vulnerable to authentication bypass due to flawed authentication mechanisms,” the company said in an advisory released last week.

“Despite client-side and backend server validation, attackers can take advantage of the weaknesses of their implementation. This vulnerability allows brute force attacks to infer valid credentials or MD5 collision attacks to build authentication hashs, which could undermine the security of the device.”

Cybersecurity

In other words, successful exploitation of shortcomings can lead to authentication bypassing, which can lead to attackers gain unauthorized access to confidential configurations or destroy services.

The defect affects the next version –

PT-508 series (Firmware version 3.8 or earlier) PT-510 series (Firmware version 3.8 or earlier) PT-7528 series (Firmware version 5.0 or earlier) PT-7728 series (Firmware version 3.9 or earlier) PT-7828 series (Firmware version 4.0 or earlier) series (Firmware version 6.5 or earlier) and PT-G7828 series (Firmware version 6.5 or earlier)

Vulnerability patches can be obtained by contacting the MOXA Technical Support Team. The company evaluated Artem Turyshev from Moscow-based Rosatom Automated Control Systems (RASU) to report the vulnerability.

Outside of applying the latest fixes, businesses using affected products use firewalls or access control lists (ACLs) to restrict network access, perform network segmentation, minimize direct exposure to the Internet, implement multi-factor authentication (MFA) to access critical systems, enable event logging, and monitor network traffic and device behavior.

Please note that in mid-January 2025, Moxa resolved the same vulnerability on the Ethernet switch EDS-508A series, running firmware version 3.11 or earlier.

Cybersecurity

This development allows privilege escalation and command execution within just over two months after MOXA deployed patches for two security vulnerabilities affecting cellular routers, secured actors, and network security appliances (CVE-2024-9138 and CVE-2024-9140).

Last month we addressed multiple altitude flaws affecting various switches (CVE-2024-7695, CVE-2024-9404, and CVE-2024-9137).

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUkraine targets Russia’s Moscow ahead of a ceasefire talk with us | News of the Russian-Ukraine War
Next Article Sidewinder Apt targets the maritime, nuclear and IT sectors of Asia, the Middle East and Africa
user
  • Website

Related Posts

The SEO addiction campaign targets over 8,500 SMB users with malware disguised as AI tools

July 7, 2025

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

July 7, 2025

Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More

July 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Jack Dorsey is working on the Bluetooth messaging app, Bitchat

The SEO addiction campaign targets over 8,500 SMB users with malware disguised as AI tools

Threads are approaching X’s daily app users, new data shows

AI forces integration into the data industry, but that’s not the whole story

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.