CVE-2025-6950

CRITICAL

Moxa - Use After Free

Title source: llm
STIX 2.1

Description

An Use of Hard-coded Credentials vulnerability has been identified in Moxa’s network security appliances and routers. The system employs a hard-coded secret key to sign JSON Web Tokens (JWT) used for authentication. This insecure implementation allows an unauthenticated attacker to forge valid tokens, thereby bypassing authentication controls and impersonating any user. Exploitation of this vulnerability can result in complete system compromise, enabling unauthorized access, data theft, and full administrative control over the affected device. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.

Scores

CVSS v4 9.9
EPSS 0.0036
EPSS Percentile 58.4%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-798
Status published
Products (14)
Moxa/EDF-G1002-BP Series 1.0 - 3.17
Moxa/EDF-G1002-BP Series 3.21
Moxa/EDR-8010 Series 1.0 - 3.17
Moxa/EDR-8010 Series 3.21
Moxa/EDR-G9010 Series 1.0 - 3.14
Moxa/EDR-G9010 Series 3.21
Moxa/NAT-102 Series 1.0 - 3.17
Moxa/NAT-102 Series 3.21
Moxa/NAT-108 Series 1.0 - 3.16
Moxa/NAT-108 Series 3.21
... and 4 more
Published Oct 17, 2025
Tracked Since Feb 18, 2026