Security Enhancement: SSH Weak Key Exchange Algorithms Enabled

Published: October 21, 2025

This Alert Is From MOXA

As Industrial IoT (IIoT) adoption continues to proliferate, cybersecurity has become one of the top priorities. The Moxa Product Security Incident Response Team (PSIRT) takes a proactive approach to protect products from cybersecurity vulnerabilities. Moxa PSIRT investigates all reports of vulnerabilities that could potentially affect Moxa products. Moxa created a vulnerability management policy to provide guidance and information to our customers in the event of a reported vulnerability. The management policy ensures that Moxa’s customers have steady, unambiguous resources to help them understand how Moxa resolves or mitigates reported vulnerabilities. For any queries, please email PSIRT@moxa.com.

The remote SSH server is configured to allow key exchange algorithms that are considered weak. This is based on the IETF draft document Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH) RFC9142. Section 4 lists guidance on key exchange algorithms that should not and must not be enabled. (Source: Tenable Nessus)

As this issue is assessed as low severity, users may evaluate their environments and decide if updating is required.

 

This alert has come from: https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257313-security-enhancement-ssh-weak-key-exchange-algorithms-enabled