Home

Description

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in the API authorization logic of the affected device allows an authenticated, low-privileged user to execute the administrative `ping` function, which is restricted to higher-privileged roles. This vulnerability enables the user to perform internal network reconnaissance, potentially discovering internal hosts or services that would otherwise be inaccessible. Repeated exploitation could lead to minor resource consumption. While the overall impact is limited, it may result in some loss of confidentiality and availability on the affected device. There is no impact on the integrity of the device, and the vulnerability does not affect any subsequent systems.

PUBLISHED Reserved 2025-06-28 | Published 2025-10-17 | Updated 2025-10-17 | Assigner Moxa




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-250: Execution with Unnecessary Privileges

Product status

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21.0
unaffected

References

www.moxa.com/...-2025-6950-multiple-vulnerabilities-in-netwo vendor-advisory

cve.org (CVE-2025-6894)

nvd.nist.gov (CVE-2025-6894)

Download JSON