CVE-2025-1977

N/A Unknown

📋 TL;DR

CVE-2025-1977 allows authenticated users with read-only access to perform unauthorized configuration changes on Moxa NPort 6100-G2/6200-G2 Series devices using the MCC tool. This privilege escalation vulnerability can be exploited remotely over the network with low complexity, potentially allowing attackers to modify device settings beyond their intended permissions. Organizations using these specific Moxa serial device servers are affected.

💻 Affected Systems

Products:
  • Moxa NPort 6100-G2 Series
  • Moxa NPort 6200-G2 Series
Versions: All versions prior to patched firmware
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access (read-only credentials) and MCC tool access. Specific system conditions may affect exploitability.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with read-only credentials could reconfigure critical device settings, potentially disrupting industrial operations, enabling further network access, or compromising connected systems through manipulated serial communications.

🟠

Likely Case

Unauthorized users modify network settings, security configurations, or serial port parameters, leading to service disruption or loss of device integrity.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated devices without affecting broader operations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but has low attack complexity. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Moxa advisory for specific firmware versions

Vendor Advisory: https://www.moxa.com/en/support/product-support/security-advisory/mpsa-251731-cve-2025-1977-cve-2025-2026-multiple-vulnerabilities-in-nport-6100-g2-6200-g2-series

Restart Required: Yes

Instructions:

1. Review Moxa security advisory MPSA-251731. 2. Download latest firmware from Moxa website. 3. Backup current configuration. 4. Apply firmware update via web interface or MCC tool. 5. Verify update and restore configuration if needed.

🔧 Temporary Workarounds

Restrict Network Access

all

Limit access to NPort devices to trusted networks only

Enforce Least Privilege

all

Review and minimize user accounts with access to NPort devices

🧯 If You Can't Patch

  • Segment NPort devices on isolated network segments
  • Implement strict access controls and monitor for unauthorized configuration changes

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or MCC tool and compare against patched versions in Moxa advisory

Check Version:

Use MCC tool or web interface to check firmware version

Verify Fix Applied:

Verify firmware version matches patched version from Moxa advisory and test that read-only users cannot perform configuration changes

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized configuration changes in device logs
  • Login attempts from unexpected sources
  • MCC tool access from read-only accounts

Network Indicators:

  • Unexpected configuration traffic to NPort devices
  • MCC protocol usage from unauthorized IPs

SIEM Query:

Search for 'configuration change' events from NPort devices where user role is 'read-only'

🔗 References

📤 Share & Export