Changeflow GovPing Data Privacy & Cybersecurity Moxa Industrial Ethernet Switches Security Poli...
Routine Notice Added Final

Moxa Industrial Ethernet Switches Security Policy Bypass Vulnerability

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published
Detected
Email

Summary

CERT-FR issued advisory CERTFR-2026-AVI-0458 on 20 April 2026 disclosing CVE-2020-11868 in Moxa industrial Ethernet switches. The vulnerability allows an attacker to bypass the security policy of affected devices. Nine PT and PT-G Series product lines with firmware versions below specified thresholds are affected. Users are advised to apply patches referenced in Moxa security bulletin MPSA-258681.

“Une vulnérabilité a été découverte dans les produits Moxa. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.”

CERT-FR , verbatim from source
Published by CERT-FR on cert.ssi.gouv.fr . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

CERT-FR published a security advisory disclosing a vulnerability in Moxa industrial networking products. The flaw, tracked as CVE-2020-11868, allows an attacker to bypass security policies on affected devices. Nine product series are affected: PT-508, PT-510, PT-7528, PT-7728, PT-7828, PT-G503, PT-G510, PT-G7728, and PT-G7828, with firmware versions below specified patched releases. This is a routine vulnerability disclosure from a government computer emergency response team.

Affected parties include operators of Moxa industrial Ethernet switches who should identify firmware versions on their networks and apply available patches from Moxa's MPSA-258681 security bulletin. No compliance deadline or enforcement action is associated with this advisory. Organizations using these products in operational technology or industrial control environments should treat this as a standard patch management action.

What to do next

  1. Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs

Archived snapshot

Apr 20, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 20 avril 2026 N° CERTFR-2026-AVI-0458 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Vulnérabilité dans les produits Moxa

Gestion du document

| Référence | CERTFR-2026-AVI-0458 |
| Titre | Vulnérabilité dans les produits Moxa |
| Date de la première version | 20 avril 2026 |
| Date de la dernière version | 20 avril 2026 |
| Source(s) | Bulletin de sécurité Moxa MPSA-258681 du 20 avril 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risque

  • Contournement de la politique de sécurité

Systèmes affectés

  • PT-508 Series versions antérieures à v3.8.12
  • PT-510 Series versions antérieures à v3.8.12
  • PT-7528 Series versions antérieures à v5.0.34
  • PT-7728 Series versions antérieures à v3.9.6
  • PT-7828 Series versions antérieures à v4.0.8
  • PT-G503 Series versions antérieures à v5.3.12
  • PT-G510 Series versions antérieures à v6.5.22
  • PT-G7728 Series versions antérieures à v6.6
  • PT-G7828 Series versions antérieures à v6.6

Résumé

Une vulnérabilité a été découverte dans les produits Moxa. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 20 avril 2026 Version initiale

Get daily alerts for CERT-FR Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-FR.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-FR
Published
April 20th, 2026
Instrument
Notice
Branch
Executive
Source language
fr
Legal weight
Non-binding
Stage
Final
Change scope
Minor
Document ID
CERTFR-2026-AVI-0458

Who this affects

Applies to
Manufacturers Technology companies
Industry sector
3341 Computer & Electronics Manufacturing
Activity scope
Vulnerability disclosure Patch management Firmware updates
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Product Safety Data Privacy

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!