CVE-2025-9315: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in Moxa MXsecurity Series
An unauthenticated device registration vulnerability, caused by Improperly Controlled Modification of Dynamically-Determined Object Attributes, has been identified in the MXsecurity Series. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted JSON payload to the device's registration endpoint /api/v1/devices/register, allowing the attacker to register unauthorized devices without authentication. Although exploiting this vulnerability has limited modification of data, there is no impact to the confidentiality and availability of the affected device, as well as no loss of confidentiality, integrity, and availability within any subsequent systems.
AI Analysis
Technical Summary
CVE-2025-9315 is a vulnerability classified under CWE-915 (Improperly Controlled Modification of Dynamically-Determined Object Attributes) found in Moxa MXsecurity Series version 1.0. The flaw resides in the device registration process, specifically the /api/v1/devices/register endpoint, which accepts JSON payloads to register devices. Due to insufficient validation and control over the attributes dynamically determined during registration, an unauthenticated remote attacker can send a specially crafted JSON request to register unauthorized devices. This unauthorized registration does not require any authentication or user interaction, and the attack complexity is high, indicating some specialized knowledge or conditions are needed to exploit. Despite the unauthorized registration capability, the vulnerability does not allow modification of sensitive data, nor does it affect the confidentiality, integrity, or availability of the device or downstream systems. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and limited impact on integrity (VI:L) with no impact on confidentiality or availability. No patches are currently listed, and no known exploits have been reported in the wild. The vulnerability was published on December 10, 2025, with the CVSS score of 6.3, categorized as medium severity. This vulnerability is relevant for organizations deploying Moxa MXsecurity Series devices, which are commonly used in industrial control systems and critical infrastructure environments.
Potential Impact
For European organizations, the primary impact of CVE-2025-9315 is the potential for unauthorized device registration within Moxa MXsecurity Series deployments. While the vulnerability does not directly compromise confidentiality, integrity, or availability, unauthorized device registration could enable attackers to introduce rogue devices into the network, potentially facilitating future attacks such as lateral movement, reconnaissance, or supply chain compromise. In critical infrastructure sectors like energy, manufacturing, and transportation, where Moxa devices are often deployed, this could increase the attack surface and risk exposure. However, the limited direct impact and lack of known exploits reduce immediate risk. The medium severity rating reflects the need for vigilance but indicates that the vulnerability alone is unlikely to cause severe disruption. European organizations should consider the operational context and network segmentation to assess risk, especially where device registration endpoints are exposed or insufficiently protected.
Mitigation Recommendations
1. Restrict network access to the /api/v1/devices/register endpoint by implementing strict firewall rules and network segmentation to limit exposure to trusted management networks only. 2. Monitor device registration logs and network traffic for unusual or unauthorized registration attempts to detect potential exploitation early. 3. Implement strong authentication and authorization mechanisms on device management interfaces if supported, to prevent unauthenticated access. 4. Engage with Moxa for updates or patches addressing this vulnerability and apply them promptly once available. 5. Conduct regular security assessments and penetration testing on industrial control system networks to identify and remediate similar weaknesses. 6. Employ anomaly detection systems to identify rogue devices or unexpected network behavior that could result from unauthorized registrations. 7. Educate operational technology (OT) and IT teams about this vulnerability and the importance of securing device registration processes.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-9315: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in Moxa MXsecurity Series
Description
An unauthenticated device registration vulnerability, caused by Improperly Controlled Modification of Dynamically-Determined Object Attributes, has been identified in the MXsecurity Series. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted JSON payload to the device's registration endpoint /api/v1/devices/register, allowing the attacker to register unauthorized devices without authentication. Although exploiting this vulnerability has limited modification of data, there is no impact to the confidentiality and availability of the affected device, as well as no loss of confidentiality, integrity, and availability within any subsequent systems.
AI-Powered Analysis
Technical Analysis
CVE-2025-9315 is a vulnerability classified under CWE-915 (Improperly Controlled Modification of Dynamically-Determined Object Attributes) found in Moxa MXsecurity Series version 1.0. The flaw resides in the device registration process, specifically the /api/v1/devices/register endpoint, which accepts JSON payloads to register devices. Due to insufficient validation and control over the attributes dynamically determined during registration, an unauthenticated remote attacker can send a specially crafted JSON request to register unauthorized devices. This unauthorized registration does not require any authentication or user interaction, and the attack complexity is high, indicating some specialized knowledge or conditions are needed to exploit. Despite the unauthorized registration capability, the vulnerability does not allow modification of sensitive data, nor does it affect the confidentiality, integrity, or availability of the device or downstream systems. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and limited impact on integrity (VI:L) with no impact on confidentiality or availability. No patches are currently listed, and no known exploits have been reported in the wild. The vulnerability was published on December 10, 2025, with the CVSS score of 6.3, categorized as medium severity. This vulnerability is relevant for organizations deploying Moxa MXsecurity Series devices, which are commonly used in industrial control systems and critical infrastructure environments.
Potential Impact
For European organizations, the primary impact of CVE-2025-9315 is the potential for unauthorized device registration within Moxa MXsecurity Series deployments. While the vulnerability does not directly compromise confidentiality, integrity, or availability, unauthorized device registration could enable attackers to introduce rogue devices into the network, potentially facilitating future attacks such as lateral movement, reconnaissance, or supply chain compromise. In critical infrastructure sectors like energy, manufacturing, and transportation, where Moxa devices are often deployed, this could increase the attack surface and risk exposure. However, the limited direct impact and lack of known exploits reduce immediate risk. The medium severity rating reflects the need for vigilance but indicates that the vulnerability alone is unlikely to cause severe disruption. European organizations should consider the operational context and network segmentation to assess risk, especially where device registration endpoints are exposed or insufficiently protected.
Mitigation Recommendations
1. Restrict network access to the /api/v1/devices/register endpoint by implementing strict firewall rules and network segmentation to limit exposure to trusted management networks only. 2. Monitor device registration logs and network traffic for unusual or unauthorized registration attempts to detect potential exploitation early. 3. Implement strong authentication and authorization mechanisms on device management interfaces if supported, to prevent unauthenticated access. 4. Engage with Moxa for updates or patches addressing this vulnerability and apply them promptly once available. 5. Conduct regular security assessments and penetration testing on industrial control system networks to identify and remediate similar weaknesses. 6. Employ anomaly detection systems to identify rogue devices or unexpected network behavior that could result from unauthorized registrations. 7. Educate operational technology (OT) and IT teams about this vulnerability and the importance of securing device registration processes.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Moxa
- Date Reserved
- 2025-08-21T08:30:52.748Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69393610fd479f45ea552451
Added to database: 12/10/2025, 8:57:52 AM
Last enriched: 12/17/2025, 9:26:35 AM
Last updated: 2/7/2026, 2:51:59 PM
Views: 79
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.