Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1977: CWE-250: Execution with Unnecessary Privileges in Moxa NPort 6100-G2/6200-G2 Series

0
High
VulnerabilityCVE-2025-1977cvecve-2025-1977cwe-250
Published: Wed Dec 31 2025 (12/31/2025, 07:23:28 UTC)
Source: CVE Database V5
Vendor/Project: Moxa
Product: NPort 6100-G2/6200-G2 Series

Description

CVE-2025-1977 is a high-severity vulnerability affecting Moxa NPort 6100-G2/6200-G2 Series devices, allowing authenticated users with read-only access to perform unauthorized configuration changes via the MCC tool. Exploitation requires low attack complexity, no user interaction, and can be done remotely over the network, but depends on specific system configurations. Successful exploitation can compromise device confidentiality, integrity, and availability by enabling privilege escalation beyond intended user roles. No impact on other connected systems has been reported. The vulnerability does not have known exploits in the wild yet. European organizations using these devices in critical infrastructure or industrial environments should prioritize mitigation. Patch availability is not indicated, so alternative controls are necessary. The vulnerability has a CVSS 4. 0 score of 7. 7, reflecting its high risk due to network attack vector and privilege escalation potential.

AI-Powered Analysis

AILast updated: 01/07/2026, 13:05:23 UTC

Technical Analysis

CVE-2025-1977 is a vulnerability classified under CWE-250 (Execution with Unnecessary Privileges) affecting Moxa NPort 6100-G2 and 6200-G2 Series serial device servers. These devices are commonly used to connect serial devices to Ethernet networks in industrial and critical infrastructure environments. The flaw allows an authenticated user with only read-only access privileges to escalate their permissions and perform unauthorized configuration changes through the Moxa CLI Configuration (MCC) tool. The attack can be executed remotely over the network without requiring user interaction, and with low complexity, although it depends on certain system conditions or configurations being present. This means that an attacker who has limited access credentials could manipulate device settings, potentially disrupting device operation or exposing sensitive configuration data. The vulnerability impacts confidentiality, integrity, and availability of the affected devices but does not extend to other connected systems. The CVSS 4.0 base score of 7.7 reflects the high severity due to network accessibility, low attack complexity, and significant impact on device security. No known public exploits or patches have been reported at the time of publication, indicating that organizations must rely on compensating controls until a fix is available.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, energy, transportation, and critical infrastructure sectors that deploy Moxa NPort 6100-G2/6200-G2 Series devices, this vulnerability poses a significant risk. Unauthorized configuration changes could lead to device misconfiguration, operational disruption, or exposure of sensitive operational data. Given the devices' role as gateways between serial equipment and IP networks, exploitation could undermine the security posture of operational technology (OT) environments, potentially causing downtime or safety incidents. Confidentiality breaches could expose sensitive industrial control parameters, while integrity violations could allow attackers to alter device behavior. Availability impacts could disrupt critical communication channels. Since the vulnerability requires authenticated access, insider threats or compromised credentials are primary risk vectors. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially in environments where these devices are widely deployed and network access is possible.

Mitigation Recommendations

1. Restrict network access to the management interfaces of Moxa NPort 6100-G2/6200-G2 devices using network segmentation and firewall rules to limit exposure only to trusted administrators. 2. Enforce strong authentication mechanisms and credential management to prevent unauthorized access, including regular password changes and multi-factor authentication if supported. 3. Monitor device logs and network traffic for unusual configuration changes or access patterns indicative of exploitation attempts. 4. Review and tighten user role assignments to ensure that read-only users cannot access configuration tools or escalate privileges. 5. Apply any available firmware updates or patches from Moxa as soon as they are released. 6. If patches are not yet available, consider disabling or restricting the MCC tool usage or management protocols that allow configuration changes. 7. Conduct regular security audits and vulnerability assessments on OT devices to detect and remediate misconfigurations. 8. Implement intrusion detection systems tailored for OT networks to identify anomalous behavior related to device configuration changes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Moxa
Date Reserved
2025-03-05T01:48:49.764Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6954d0b7db813ff03ed1d613

Added to database: 12/31/2025, 7:28:55 AM

Last enriched: 1/7/2026, 1:05:23 PM

Last updated: 1/8/2026, 5:41:15 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats