diff --git a/cves/2024/12xxx/CVE-2024-12297.json b/cves/2024/12xxx/CVE-2024-12297.json
index 67bdae9a268..eb5b121ee46 100644
--- a/cves/2024/12xxx/CVE-2024-12297.json
+++ b/cves/2024/12xxx/CVE-2024-12297.json
@@ -8,7 +8,7 @@
"assignerShortName": "Moxa",
"dateReserved": "2024-12-06T04:02:40.742Z",
"datePublished": "2025-01-15T10:00:46.524Z",
- "dateUpdated": "2025-01-15T14:49:22.117Z"
+ "dateUpdated": "2025-03-06T08:27:52.297Z"
},
"containers": {
"cna": {
@@ -25,6 +25,123 @@
"versionType": "custom"
}
]
+ },
+ {
+ "defaultStatus": "unaffected",
+ "product": "PT-508 Series",
+ "vendor": "Moxa",
+ "versions": [
+ {
+ "lessThanOrEqual": "3.8",
+ "status": "affected",
+ "version": "1.0",
+ "versionType": "custom"
+ }
+ ]
+ },
+ {
+ "defaultStatus": "unaffected",
+ "product": "PT-510 Series",
+ "vendor": "Moxa",
+ "versions": [
+ {
+ "lessThanOrEqual": "3.8",
+ "status": "affected",
+ "version": "1.0",
+ "versionType": "custom"
+ }
+ ]
+ },
+ {
+ "defaultStatus": "unaffected",
+ "product": "PT-7528 Series",
+ "vendor": "Moxa",
+ "versions": [
+ {
+ "lessThanOrEqual": "5.0",
+ "status": "affected",
+ "version": "1.0",
+ "versionType": "custom"
+ }
+ ]
+ },
+ {
+ "defaultStatus": "unaffected",
+ "product": "PT-7728 Series",
+ "vendor": "Moxa",
+ "versions": [
+ {
+ "lessThanOrEqual": "3.9",
+ "status": "affected",
+ "version": "1.0",
+ "versionType": "custom"
+ }
+ ]
+ },
+ {
+ "defaultStatus": "unaffected",
+ "product": "PT-7828 Series",
+ "vendor": "Moxa",
+ "versions": [
+ {
+ "lessThanOrEqual": "4.0",
+ "status": "affected",
+ "version": "1.0",
+ "versionType": "custom"
+ }
+ ]
+ },
+ {
+ "defaultStatus": "unaffected",
+ "product": "PT-G503 Series",
+ "vendor": "Moxa",
+ "versions": [
+ {
+ "lessThanOrEqual": "5.3",
+ "status": "affected",
+ "version": "1.0",
+ "versionType": "custom"
+ }
+ ]
+ },
+ {
+ "defaultStatus": "unaffected",
+ "product": "PT-G510 Series",
+ "vendor": "Moxa",
+ "versions": [
+ {
+ "lessThanOrEqual": "6.5",
+ "status": "affected",
+ "version": "1.0",
+ "versionType": "custom"
+ }
+ ]
+ },
+ {
+ "defaultStatus": "unaffected",
+ "product": "PT-G7728 Series",
+ "vendor": "Moxa",
+ "versions": [
+ {
+ "lessThanOrEqual": "6.5",
+ "status": "affected",
+ "version": "1.0",
+ "versionType": "custom"
+ }
+ ]
+ },
+ {
+ "defaultStatus": "unaffected",
+ "product": "PT-G7828 Series",
+ "vendor": "Moxa",
+ "versions": [
+ {
+ "lessThanOrEqual": "6.5",
+ "status": "affected",
+ "version": "1.0",
+ "versionType": "custom"
+ }
+ ]
}
],
"credits": [
@@ -41,10 +158,10 @@
{
"base64": false,
"type": "text/html",
- "value": "Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.
"
+ "value": "Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.
"
}
],
- "value": "Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device."
+ "value": "Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device."
}
],
"impacts": [
@@ -107,7 +224,7 @@
"providerMetadata": {
"orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa",
"shortName": "Moxa",
- "dateUpdated": "2025-01-15T10:00:46.524Z"
+ "dateUpdated": "2025-03-06T08:27:52.297Z"
},
"references": [
{
@@ -115,6 +232,12 @@
"vendor-advisory"
],
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241407-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-in-eds-508a-series"
+ },
+ {
+ "tags": [
+ "vendor-advisory"
+ ],
+ "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241408-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-identified-in-pt-switches"
}
],
"solutions": [
@@ -124,14 +247,14 @@
{
"base64": false,
"type": "text/html",
- "value": "
Moxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below.
EDS-508A Series: Please contact Moxa Technical Support for the security patch
Moxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below.
EDS-508A Series: Please contact Moxa Technical Support for the security patch
PT Series: Please contact Moxa Technical Support for the security patch