As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories


ioLogik 4000 Series Multiple Web Server Vulnerabilities and Improper Access Control Vulnerability

ioLogik 4000 Series (ioLogik E4200) firmware v1.6 and prior is affected by multiple web server vulnerabilities and an improper access control vulnerability.  

Web Server Vulnerabilities 

The web server vulnerabilities arise from improper configuration or implementation of HTTP headers. Attackers could exploit the vulnerabilities to compromise the web service. 

Improper Access Control Vulnerability 

The improper access control vulnerability results from improper control of an existing unauthorized service. Attackers could exploit the vulnerability by connecting to the unauthorized service. Successful exploitation of the vulnerability could lead to unauthorized access. 

The identified vulnerability types and potential impacts are shown below: 

Item Vulnerability Type Impact
Existing unauthorized service 
(CWE-284 Improper Access Control) 
Attackers can gain unauthorized access 
Session cookie attributes not set properly 
(CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag) 
Attackers can compromise the web service 
Session headers not implemented. 
(CWE-1021: Improper Restriction of Rendered UI Layers or Frames) 
Attackers can compromise the web service 
Server banner information disclosure 
(CWE-200: Exposure of Sensitive Information to an Unauthorized Actor) 
Attackers can compromise the web service 

Affected Products:

The affected products and firmware versions are shown below.

Product Series Affected Versions
ioLogik 4000 Series (ioLogik E4200)  Firmware version v1.6 and prior 



Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.

Product Series Solutions
ioLogik 4000 Series (ioLogik E4200)  Please contact Moxa Technical Support for the security patch.



  • Minimize network exposure to ensure the device is not accessible from the Internet. 

  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). 

  • The starting point of all the above vulnerabilities is the web service, so, we recommend temporarily disabling the web service until a patch with a fix is installed or the firmware is updated to prevent further damage from these vulnerabilities.  


Products Confirmed Not Vulnerable 

Only products listed in the Affected Products section of this advisory are known to be affected by these vulnerabilities. 


Revision History:

1.0 First Release Aug. 24, 2022

Relevant Products

ioLogik 4000 Series ·

  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!