CVE-2020-6995
📋 TL;DR
This vulnerability allows attackers to gain unauthorized access to Moxa PT-7528 and PT-7828 series industrial switches by exploiting weak password requirements. Affected organizations using these devices with vulnerable firmware versions are at risk of network compromise.
💻 Affected Systems
- Moxa PT-7528 series
- Moxa PT-7828 series
📦 What is this software?
Pt 7528 12msc 12tx 4gsfp Hv Firmware by Moxa
View all CVEs affecting Pt 7528 12msc 12tx 4gsfp Hv Firmware →
Pt 7528 12msc 12tx 4gsfp Hv Hv Firmware by Moxa
View all CVEs affecting Pt 7528 12msc 12tx 4gsfp Hv Hv Firmware →
Pt 7528 12msc 12tx 4gsfp Wv Firmware by Moxa
View all CVEs affecting Pt 7528 12msc 12tx 4gsfp Wv Firmware →
Pt 7528 12msc 12tx 4gsfp Wv Wv Firmware by Moxa
View all CVEs affecting Pt 7528 12msc 12tx 4gsfp Wv Wv Firmware →
Pt 7528 12mst 12tx 4gsfp Hv Firmware by Moxa
View all CVEs affecting Pt 7528 12mst 12tx 4gsfp Hv Firmware →
Pt 7528 12mst 12tx 4gsfp Hv Hv Firmware by Moxa
View all CVEs affecting Pt 7528 12mst 12tx 4gsfp Hv Hv Firmware →
Pt 7528 12mst 12tx 4gsfp Wv Firmware by Moxa
View all CVEs affecting Pt 7528 12mst 12tx 4gsfp Wv Firmware →
Pt 7528 12mst 12tx 4gsfp Wv Wv Firmware by Moxa
View all CVEs affecting Pt 7528 12mst 12tx 4gsfp Wv Wv Firmware →
Pt 7528 16msc 8tx 4gsfp Hv Firmware by Moxa
View all CVEs affecting Pt 7528 16msc 8tx 4gsfp Hv Firmware →
Pt 7528 16msc 8tx 4gsfp Hv Hv Firmware by Moxa
View all CVEs affecting Pt 7528 16msc 8tx 4gsfp Hv Hv Firmware →
Pt 7528 16msc 8tx 4gsfp Wv Firmware by Moxa
View all CVEs affecting Pt 7528 16msc 8tx 4gsfp Wv Firmware →
Pt 7528 16msc 8tx 4gsfp Wv Wv Firmware by Moxa
View all CVEs affecting Pt 7528 16msc 8tx 4gsfp Wv Wv Firmware →
Pt 7528 16mst 8tx 4gsfp Hv Firmware by Moxa
View all CVEs affecting Pt 7528 16mst 8tx 4gsfp Hv Firmware →
Pt 7528 16mst 8tx 4gsfp Hv Hv Firmware by Moxa
View all CVEs affecting Pt 7528 16mst 8tx 4gsfp Hv Hv Firmware →
Pt 7528 16mst 8tx 4gsfp Wv Firmware by Moxa
View all CVEs affecting Pt 7528 16mst 8tx 4gsfp Wv Firmware →
Pt 7528 16mst 8tx 4gsfp Wv Wv Firmware by Moxa
View all CVEs affecting Pt 7528 16mst 8tx 4gsfp Wv Wv Firmware →
Pt 7528 20msc 4tx 4gsfp Hv Firmware by Moxa
View all CVEs affecting Pt 7528 20msc 4tx 4gsfp Hv Firmware →
Pt 7528 20msc 4tx 4gsfp Hv Hv Firmware by Moxa
View all CVEs affecting Pt 7528 20msc 4tx 4gsfp Hv Hv Firmware →
Pt 7528 20msc 4tx 4gsfp Wv Firmware by Moxa
View all CVEs affecting Pt 7528 20msc 4tx 4gsfp Wv Firmware →
Pt 7528 20msc 4tx 4gsfp Wv Wv Firmware by Moxa
View all CVEs affecting Pt 7528 20msc 4tx 4gsfp Wv Wv Firmware →
Pt 7528 20mst 4tx 4gsfp Hv Firmware by Moxa
View all CVEs affecting Pt 7528 20mst 4tx 4gsfp Hv Firmware →
Pt 7528 20mst 4tx 4gsfp Hv Hv Firmware by Moxa
View all CVEs affecting Pt 7528 20mst 4tx 4gsfp Hv Hv Firmware →
Pt 7528 20mst 4tx 4gsfp Wv Firmware by Moxa
View all CVEs affecting Pt 7528 20mst 4tx 4gsfp Wv Firmware →
Pt 7528 20mst 4tx 4gsfp Wv Wv Firmware by Moxa
View all CVEs affecting Pt 7528 20mst 4tx 4gsfp Wv Wv Firmware →
Pt 7528 8msc 16tx 4gsfp Hv Firmware by Moxa
View all CVEs affecting Pt 7528 8msc 16tx 4gsfp Hv Firmware →
Pt 7528 8msc 16tx 4gsfp Hv Hv Firmware by Moxa
View all CVEs affecting Pt 7528 8msc 16tx 4gsfp Hv Hv Firmware →
Pt 7528 8msc 16tx 4gsfp Wv Firmware by Moxa
View all CVEs affecting Pt 7528 8msc 16tx 4gsfp Wv Firmware →
Pt 7528 8msc 16tx 4gsfp Wv Wv Firmware by Moxa
View all CVEs affecting Pt 7528 8msc 16tx 4gsfp Wv Wv Firmware →
Pt 7528 8mst 16tx 4gsfp Hv Firmware by Moxa
View all CVEs affecting Pt 7528 8mst 16tx 4gsfp Hv Firmware →
Pt 7528 8mst 16tx 4gsfp Hv Hv Firmware by Moxa
View all CVEs affecting Pt 7528 8mst 16tx 4gsfp Hv Hv Firmware →
Pt 7528 8mst 16tx 4gsfp Wv Firmware by Moxa
View all CVEs affecting Pt 7528 8mst 16tx 4gsfp Wv Firmware →
Pt 7528 8mst 16tx 4gsfp Wv Wv Firmware by Moxa
View all CVEs affecting Pt 7528 8mst 16tx 4gsfp Wv Wv Firmware →
Pt 7528 8ssc 16tx 4gsfp Hv Hv Firmware by Moxa
View all CVEs affecting Pt 7528 8ssc 16tx 4gsfp Hv Hv Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete network takeover, industrial control system compromise, data exfiltration, and potential physical damage to industrial processes.
Likely Case
Unauthorized administrative access to switches, network configuration changes, traffic interception, and lateral movement within industrial networks.
If Mitigated
Limited impact if strong network segmentation, access controls, and monitoring are in place to detect authentication attempts.
🎯 Exploit Status
Exploitation requires authentication attempts but is trivial due to weak password requirements. Attackers can brute-force or guess weak passwords.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: PT-7528: Version 5.0 or higher, PT-7828: Version 4.0 or higher
Vendor Advisory: https://www.moxa.com/en/support/product-support/security-advisory/moxa-pt-7528-pt-7828-series-multiple-vulnerabilities
Restart Required: Yes
Instructions:
1. Download latest firmware from Moxa support portal. 2. Backup current configuration. 3. Upload new firmware via web interface or CLI. 4. Reboot device. 5. Restore configuration if needed.
🔧 Temporary Workarounds
Enforce Strong Password Policy
allImplement and enforce strong password requirements including minimum length, complexity, and regular rotation.
Network Segmentation
allIsolate industrial switches from corporate networks and internet using firewalls and VLANs.
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach these devices
- Enable detailed logging and monitoring of all authentication attempts to these switches
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface (System > System Information) or CLI command 'show version'
Check Version:
show version
Verify Fix Applied:
Verify firmware version is PT-7528: 5.0+ or PT-7828: 4.0+ and test that strong password requirements are enforced
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts
- Successful logins from unusual IP addresses
- Configuration changes from unauthorized users
Network Indicators:
- Unusual traffic patterns from switch management interfaces
- Authentication attempts to switch management ports
SIEM Query:
source="switch_logs" AND (event_type="authentication_failure" OR event_type="configuration_change")