As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories

SUMMARY

CVE-2024-12297: Frontend Authorization Logic Disclosure Vulnerability Identified in PT Switches

  • Security Advisory ID: MPSA-241408
  • Version: V1.0
  • Release Date: Mar 06, 2025
  • Reference:

    CVE-2024-12297 (Moxa) 

Multiple Moxa PT switches are vulnerable to an authentication bypass because of flaws in their authorization mechanism. Despite client-side and back-end server verification, attackers can exploit weaknesses in its implementation. This vulnerability may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device. 

The Identified Vulnerability Type and Potential Impact 

Item Vulnerability Type Impact
1

CWE-656: Reliance on Security Through Obscurity (CVE-2024-12297) 

Exploitation of this vulnerability could allow attackers to bypass authentication, perform brute-force or MD5 collision attacks, and gain unauthorized access to sensitive configurations or disrupt services. 

Vulnerability Scoring Details 

ID
Base Score
Vector
Severity

Unauthenticated

Remote Exploits

CVE-2024-12297

CVSS 4.0: 9.2

AV:N/AC:L/AT:P/PR:N/UI:N/

VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

Critical Yes
AFFECTED PRODUCTS AND SOLUTIONS

The Products Affected by CVE-2024-12297 

The affected products and firmware versions are listed in the following table. 

Product Series Affected Versions
PT-508 Series  Firmware version 3.8 and earlier 
PT-510 Series  Firmware version 3.8 and earlier 
PT-7528 Series  Firmware version 5.0 and earlier 
PT-7728 Series  Firmware version 3.9 and earlier 
PT-7828 Series  Firmware version 4.0 and earlier 
PT-G503 Series  Firmware version 5.3 and earlier 
PT-G510 Series  Firmware version 6.5 and earlier 
PT-G7728 Series  Firmware version 6.5 and earlier 
PT-G7828 Series  Firmware version 6.5 and earlier 

 

Solutions

Moxa has developed appropriate solutions to address vulnerability. The solutions for the affected products are listed in the following table. 

Product Series Solutions
PT-508 Series  Please contact Moxa Technical Support for the security patch
PT-510 Series  Please contact Moxa Technical Support for the security patch
PT-7528 Series  Please contact Moxa Technical Support for the security patch
PT-7728 Series  Please contact Moxa Technical Support for the security patch
PT-7828 Series  Please contact Moxa Technical Support for the security patch
PT-G503 Series  Please contact Moxa Technical Support for the security patch
PT-G510 Series Please contact Moxa Technical Support for the security patch
PT-G7728 Series  Please contact Moxa Technical Support for the security patch
PT-G7828 Series  Please contact Moxa Technical Support for the security patch

 

Mitigations

Product-specific solutions are available in the Affected Products and Solutions section. 

For additional security measures, refer to the General Security Recommendations section.

 

General Security Recommendations

To safeguard devices and networks, we recommend implementing the following recommendations to mitigate potential risks:

  1. Restrict Network Access
    • Use firewalls or access control lists (ACLs) to limit communication to trusted IP addresses and networks.
    • Segregate operational networks from other networks (e.g., enterprise networks) using VLANs or physical separation.
  2. Minimize Exposure
    • Avoid exposing devices directly to the Internet.
    • Disable unused network services and ports to reduce the attack surface.
  3. Enhance Device Authentication and Access Control
    • Implement multi-factor authentication (MFA) for accessing critical systems.
    • Use role-based access control (RBAC) to enforce the principle of least privilege.
  4. Regularly Update Firmware and Software
    • Keep devices updated with the latest firmware versions and security patches.
    • Establish a regular patch management schedule to address newly identified vulnerabilities.
  5. Secure Remote Access
    • Use encrypted communication protocols (e.g., VPN, SSH) for remote access.
    • Restrict remote access to authorized personnel only and enforce strong authentication mechanisms.
  6. Implement Anomaly Detection Techniques
    • Monitor network traffic and device behavior for unusual or unauthorized activities.
    • Use tools or techniques that can identify anomalies and provide alerts for potential threats.
  7. Implement Logging and Monitoring
    • Enable event logging and maintain audit trails on devices.
    • Regularly review logs for anomalies and unauthorized access attempts.
  8. Conduct Regular Security Assessments
    • Perform vulnerability assessments to identify potential risks.
    • Regularly review device configurations to ensure compliance with security policies.

 

Acknowledgement

We would like to express our appreciation to Artem Turyshev from Rosatom Automated Control Systems Joint-Stock Company for reporting the vulnerability, collaborating with us to enhance the security of our products, and helping us deliver better service to our customers. 

 

Revision History:

VERSION DESCRIPTION RELEASE DATE
1.0 First release March 6, 2025

Relevant Products

PT-508 Series · PT-510 Series · PT-7528 Series · PT-7728 Series · PT-7828 Series · PT-G503 Series · PT-G510 Series · PT-G7728 Series · PT-G7828 Series ·

  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!
Feedback