Moxa’s Ethernet switch EDS-508A Series, running firmware...
Critical severity
Unreviewed
Published
Jan 15, 2025
to the GitHub Advisory Database
•
Updated Jan 15, 2025
Description
Published by the National Vulnerability Database
Jan 15, 2025
Published to the GitHub Advisory Database
Jan 15, 2025
Last updated
Jan 15, 2025
Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.
References