Use of Hard-coded Credentials in Moxa Network Security Appliances
CVE-2025-6950

9.9CRITICAL

Key Information:

Vendor

Moxa

Vendor
CVE Published:
17 October 2025

What is CVE-2025-6950?

A vulnerability exists in Moxa’s network security appliances and routers due to the use of a hard-coded secret key for signing JSON Web Tokens (JWT) used in user authentication. This implementation flaw permits unauthenticated attackers to forge valid tokens, effectively circumventing existing authentication mechanisms. By exploiting this vulnerability, attackers can impersonate any user, leading to unauthorized access, potential data breach, and complete administrative takeover of the affected devices. Although this does not compromise the confidentiality or integrity of subsequent systems, it poses a significant threat to the affected devices' overall security.

Affected Version(s)

EDF-G1002-BP Series 1.0 <= 3.17

EDR-8010 Series 1.0 <= 3.17

EDR-G9010 Series 1.0 <= 3.14

References

CVSS V4

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-6950 : Use of Hard-coded Credentials in Moxa Network Security Appliances