Home

Description

An Incorrect Authorization vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in the API authentication mechanism allows unauthorized access to protected API endpoints, including those intended for administrative functions. This vulnerability can be exploited after a legitimate user has logged in, as the system fails to properly validate session context or privilege boundaries. An attacker may leverage this flaw to perform unauthorized privileged operations. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.

PUBLISHED Reserved 2025-06-28 | Published 2025-10-17 | Updated 2025-10-17 | Assigner Moxa




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H

Problem types

CWE-863: Incorrect Authorization

Product status

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21.0
unaffected

References

www.moxa.com/...-2025-6950-multiple-vulnerabilities-in-netwo vendor-advisory

cve.org (CVE-2025-6892)

nvd.nist.gov (CVE-2025-6892)

Download JSON