Home

Description

An Use of Hard-coded Credentials vulnerability has been identified in Moxa’s network security appliances and routers. The system employs a hard-coded secret key to sign JSON Web Tokens (JWT) used for authentication. This insecure implementation allows an unauthenticated attacker to forge valid tokens, thereby bypassing authentication controls and impersonating any user. Exploitation of this vulnerability can result in complete system compromise, enabling unauthorized access, data theft, and full administrative control over the affected device. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.

PUBLISHED Reserved 2025-07-01 | Published 2025-10-17 | Updated 2025-10-17 | Assigner Moxa




CRITICAL: 9.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H

Problem types

CWE-798: Use of Hard-coded Credentials

Product status

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21.0
unaffected

References

www.moxa.com/...-2025-6950-multiple-vulnerabilities-in-netwo vendor-advisory

cve.org (CVE-2025-6950)

nvd.nist.gov (CVE-2025-6950)

Download JSON