Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.
CVSS
No CVSS.
References
Configurations
No configuration.
History
06 Mar 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device. | |
References |
|
15 Jan 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-15 10:15
Updated : 2025-03-06 09:15
NVD link : CVE-2024-12297
Mitre link : CVE-2024-12297
CVE.ORG link : CVE-2024-12297
JSON object : View
Products Affected
No product.
CWE
CWE-656
Reliance on Security Through Obscurity