Description
An improper ownership management vulnerability has been identified in Moxa’s Secure Router. Because of improper ownership management, a low-privileged authenticated user may access a configuration file containing the hashed password of the administrative account. Successful exploitation of this vulnerability could allow an attacker to obtain sensitive information. Exploitation is only possible under a specific condition — when the configuration file has been exported. This vulnerability does not impact the integrity or availability of the affected product, and no confidentiality, integrity, or availability impact to the subsequent system has been identified.
Published: 2026-04-27
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Exposure (Admin Password Hash)
Action: Apply Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Title Improper Ownership Management Permits Low‑Privilege Access to Admin Password Hash

Mon, 27 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Description An improper ownership management vulnerability has been identified in Moxa’s Secure Router. Because of improper ownership management, a low-privileged authenticated user may access a configuration file containing the hashed password of the administrative account. Successful exploitation of this vulnerability could allow an attacker to obtain sensitive information. Exploitation is only possible under a specific condition — when the configuration file has been exported. This vulnerability does not impact the integrity or availability of the affected product, and no confidentiality, integrity, or availability impact to the subsequent system has been identified.
First Time appeared Moxa
Moxa edr-8010 Series
Moxa edr-g9010 Series
Weaknesses CWE-282
CPEs cpe:2.3:a:moxa:edr-8010_series:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:edr-8010_series:3.24:*:*:*:*:*:*:*
cpe:2.3:a:moxa:edr-g9010_series:*:*:*:*:*:*:*:*
cpe:2.3:a:moxa:edr-g9010_series:3.24:*:*:*:*:*:*:*
Vendors & Products Moxa
Moxa edr-8010 Series
Moxa edr-g9010 Series
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Moxa Edr-8010 Series Edr-g9010 Series
cve-icon MITRE

Status: PUBLISHED

Assigner: Moxa

Published:

Updated: 2026-04-27T15:14:35.199Z

Reserved: 2026-03-10T07:56:27.311Z

Link: CVE-2026-3867

cve-icon Vulnrichment

Updated: 2026-04-27T15:14:31.747Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-27T04:16:04.937

Modified: 2026-04-27T18:57:20.293

Link: CVE-2026-3867

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:00:14Z

Weaknesses