Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9315: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in Moxa MXsecurity Series

0
Medium
VulnerabilityCVE-2025-9315cvecve-2025-9315cwe-915
Published: Wed Dec 10 2025 (12/10/2025, 08:31:08 UTC)
Source: CVE Database V5
Vendor/Project: Moxa
Product: MXsecurity Series

Description

An unauthenticated device registration vulnerability, caused by Improperly Controlled Modification of Dynamically-Determined Object Attributes, has been identified in the MXsecurity Series. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted JSON payload to the device's registration endpoint /api/v1/devices/register, allowing the attacker to register unauthorized devices without authentication. Although exploiting this vulnerability has limited modification of data, there is no impact to the confidentiality and availability of the affected device, as well as no loss of confidentiality, integrity, and availability within any subsequent systems.

AI-Powered Analysis

AILast updated: 12/10/2025, 09:13:12 UTC

Technical Analysis

CVE-2025-9315 is a vulnerability identified in the Moxa MXsecurity Series (version 1.0) that arises from improper control over dynamically-determined object attributes (CWE-915). Specifically, the device's registration API endpoint (/api/v1/devices/register) fails to enforce authentication, allowing unauthenticated remote attackers to send specially crafted JSON payloads to register unauthorized devices. This flaw enables attackers to add devices to the system without any authentication or user interaction. Despite this unauthorized registration capability, the vulnerability has limited impact on the device's data modification capabilities and does not affect confidentiality, integrity, or availability of the device or any downstream systems. The vulnerability was assigned a CVSS 4.0 score of 6.3, indicating medium severity, with the attack vector being network-based, high attack complexity, no privileges required, and no user interaction needed. No known exploits have been reported in the wild, and no patches have been published at the time of disclosure. The root cause is the lack of proper validation and control over dynamically assigned object attributes during device registration, which allows bypassing authentication controls. This vulnerability could potentially be leveraged in scenarios where unauthorized devices are introduced into a network, possibly leading to trust or management issues within industrial or enterprise environments using MXsecurity Series devices.

Potential Impact

For European organizations, the primary impact of CVE-2025-9315 lies in the potential for unauthorized device registration within networks utilizing Moxa MXsecurity Series devices. Although the vulnerability does not directly compromise confidentiality, integrity, or availability, unauthorized devices could be introduced into the network, potentially undermining device management policies and network trust models. This could lead to indirect risks such as unauthorized network access, lateral movement, or disruption if the unauthorized devices are later leveraged for malicious activities. Industrial control systems, critical infrastructure, and enterprises relying on Moxa devices for secure communications or device management may face operational risks if unauthorized devices are registered unnoticed. The medium severity score reflects the limited direct impact but acknowledges the risk posed by unauthorized device presence in sensitive environments. European organizations with deployments in sectors like manufacturing, energy, transportation, and utilities should be particularly vigilant, as Moxa products are commonly used in industrial automation and critical infrastructure, which are high-value targets for cyber adversaries.

Mitigation Recommendations

To mitigate CVE-2025-9315 effectively, European organizations should implement the following specific measures: 1) Restrict network access to the /api/v1/devices/register endpoint by implementing network segmentation and firewall rules to limit exposure only to trusted management networks or IP addresses. 2) Monitor device registration logs and network traffic for anomalous or unauthorized registration attempts to detect exploitation attempts early. 3) Employ strong network access controls and authentication mechanisms at the network perimeter to prevent unauthorized access to device management interfaces. 4) If possible, disable or restrict the device registration API endpoint until a vendor patch is available. 5) Engage with Moxa for timely updates or patches and plan for rapid deployment once released. 6) Incorporate device identity verification processes and inventory management to detect unauthorized devices introduced via this vulnerability. 7) Conduct regular security assessments and penetration tests focusing on device management interfaces to identify similar weaknesses. These targeted mitigations go beyond generic advice by focusing on access control, monitoring, and operational procedures specific to the vulnerability's nature and attack vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Moxa
Date Reserved
2025-08-21T08:30:52.748Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69393610fd479f45ea552451

Added to database: 12/10/2025, 8:57:52 AM

Last enriched: 12/10/2025, 9:13:12 AM

Last updated: 12/11/2025, 3:51:50 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats