Security Enhancement: Web Server Transmits Cleartext Credentials

Published: November 27, 2025

This Alert Is From MOXA

As Industrial IoT (IIoT) adoption continues to proliferate, cybersecurity has become one of the top priorities. The Moxa Product Security Incident Response Team (PSIRT) takes a proactive approach to protect products from cybersecurity vulnerabilities. Moxa PSIRT investigates all reports of vulnerabilities that could potentially affect Moxa products. Moxa created a vulnerability management policy to provide guidance and information to our customers in the event of a reported vulnerability. The management policy ensures that Moxa’s customers have steady, unambiguous resources to help them understand how Moxa resolves or mitigates reported vulnerabilities. For any queries, please email PSIRT@moxa.com.

The remote web server contains several HTML form fields containing an input of type 'password' which transmit their information to a remote web server in cleartext. An attacker eavesdropping on the traffic between a web browser and server may obtain logins and passwords of valid users. (Source: Tenable Nessus)

Because the issue has low severity, users can assess their environments and decide if an update is needed.

 

This alert has come from: https://www.moxa.com/en/support/product-support/security-advisory/mpsa-252211-security-enhancement-web-server-transmits-cleartext-credentials