Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Moxa Addresses Critical Authentication Bypass Vulnerability in PT Switches



Moxa has addressed a critical authentication bypass vulnerability in its PT switches, which could have allowed attackers to bypass authentication guarantees. The company released patches for affected devices, but recommends additional measures to mitigate the risk of exploitation.

  • Moxa has released a security update to address a critical authentication bypass vulnerability in its PT switches.
  • The vulnerability, CVE-2024-12297, has a CVSS score of 9.2 and could allow attackers to bypass authentication guarantees.
  • The impacted devices include multiple Moxa PT switch models across various firmware versions.
  • Moxa recommends taking additional measures to mitigate the risk of exploitation, such as restricting network access, enforcing network segmentation, and implementing multi-factor authentication.



  • Moxa Issues Fix for Critical Authentication Bypass Vulnerability in PT Switches

    In a recent development that highlights the ever-evolving landscape of cybersecurity threats, Taiwanese company Moxa has released a security update to address a critical security flaw impacting its PT switches. The vulnerability, tracked as CVE-2024-12297, has been assigned a CVSS v4 score of 9.2 out of a maximum of 10.0, indicating the severity and potential impact of the issue.

    The authentication bypass vulnerability, which was reported by Moscow-based Rosatom Automated Control Systems (RASU), is a critical security flaw that could permit an attacker to bypass authentication guarantees on Moxa's PT switches. Despite client-side and back-end server verification, attackers can exploit weaknesses in the authorization mechanism to gain unauthorized access to sensitive configurations or disrupt services.

    The impact of this vulnerability is far-reaching, as it affects multiple Moxa PT switch models across various firmware versions. Specifically, the following PT switch series are impacted:

    * PT-508 Series (Firmware version 3.8 and earlier)
    * PT-510 Series (Firmware version 3.8 and earlier)
    * PT-7528 Series (Firmware version 5.0 and earlier)
    * PT-7728 Series (Firmware version 3.9 and earlier)
    * PT-7828 Series (Firmware version 4.0 and earlier)
    * PT-G503 Series (Firmware version 5.3 and earlier)
    * PT-G510 Series (Firmware version 6.5 and earlier)
    * PT-G7728 Series (Firmware version 6.5 and earlier), and
    * PT-G7828 Series (Firmware version 6.5 and earlier)

    Moxa has taken steps to address this critical security flaw, providing patches for the affected devices. However, companies using these products are recommended to take additional measures to mitigate the risk of exploitation:

    1. Restrict network access using firewalls or access control lists (ACLs)
    2. Enforce network segmentation
    3. Minimize direct exposure to the internet
    4. Implement multi-factor authentication (MFA) for accessing critical systems
    5. Enable event logging
    6. Monitor network traffic and device behavior for unusual activities

    This incident serves as a reminder of the importance of maintaining up-to-date security patches and taking proactive measures to protect against emerging threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Moxa-Addresses-Critical-Authentication-Bypass-Vulnerability-in-PT-Switches-ehn.shtml

  • https://thehackernews.com/2025/03/moxa-issues-fix-for-critical.html

  • https://cybersecuritynews.com/moxa-industrial-ethernet-switches-vulnerability/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-12297

  • https://www.cvedetails.com/cve/CVE-2024-12297/


  • Published: Tue Mar 11 03:43:44 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us