CVE-2025-6949
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-17

Last updated on: 2025-10-21

Assigner: Moxa Inc.

Description
An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A critical authorization flaw in the API allows an authenticated, low-privileged user to create a new administrator account, including accounts with usernames identical to existing users. In certain scenarios, this vulnerability could allow an attacker to gain full administrative control over the affected device, leading to potential account impersonation. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-17
Last Modified
2025-10-21
Generated
2026-05-07
AI Q&A
2025-10-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 9 associated CPEs
Vendor Product Version / Range
moxa edr-g9010 *
moxa network_security_appliances *
moxa edr-8010 *
moxa oncell_g4302-lte4 *
moxa nat-102 *
moxa routers *
moxa nat-108 *
moxa edf-g1002-bp *
moxa tn-4900 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-250 The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Execution with Unnecessary Privileges flaw in Moxa's network security appliances and routers. It is a critical authorization issue in the API that allows an authenticated user with low privileges to create new administrator accounts, even with usernames identical to existing users. This can lead to full administrative control over the device and potential account impersonation.


How can this vulnerability impact me? :

Exploiting this vulnerability can give an attacker full administrative control over the affected device, compromising its confidentiality, integrity, and availability. This could lead to unauthorized changes, disruption of services, and impersonation of legitimate accounts on the device itself. However, it does not affect the confidentiality or integrity of other connected systems.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart