Home
1
Hot News
2
Information Security
3
[Cybersecurity Vulnerability Notice] Moxa4
https://www.kjintelligent.com/en/ KJ Intelligent Corp.
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】存在風險        Palo Alto 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料、權限提升及繞過身份驗證,其影響系統或版本如下:受影響之系統/漏洞描述:PAN-OS 10.1.14-h16 之前的 PAN-OS 10.1 版本PAN-OS 10.2.17 之前的 PAN-OS 10.2 版本PAN-OS 11.0.3 之前的 PAN-OS 11.0 版本PAN-OS 11.1.10 之前的 PAN-OS 11.1 版本PAN-OS 11.2.7 之前的 PAN-OS 11.2 版本GlobalProtect App 6.3 中 6.3.3-h1 on Windows, macOS 之前的版本GlobalProtect App 6.2 中 6.2.8-h2 on Windows, macOS 之前的版本GlobalProtect App 6.1 on Windows, macOS 所有版本GlobalProtect App 6.0 on Windows, macOS 所有版本建議改善措施:           企業及使用者如有上述漏洞版本應儘速更新: 請將 PAN-OS 10.1.14-h16 之前的 PAN-OS 10.1 版本更新至10.1.14-h16 [ETA: July 2025]或更高版本。請將 PAN-OS 10.2.17 之前的 PAN-OS 10.2 版本更新至11.2.17 [ETA: June 2025]或更高版本。請將 PAN-OS 11.0.3 之前的 PAN-OS 11.0 版本更新至11.0.3或更高版本。請將 PAN-OS 11.1.10 之前的 PAN-OS 11.1 版本更新至11.1.10或更高版本。請將 PAN-OS 11.2.8 之前的 PAN-OS 11.2 版本更新至11.2.8或更高版本。請將 GlobalProtect App 6.3 中 6.3.3-h1 on Windows, macOS 之前的版本更新至6.3.3-h1 (ETA: 12 June, 2025)或更高版本。請將 GlobalProtect App 6.2 中 6.2.8-h2 on Windows, macOS 之前的版本更新至6.2.8-h2 (ETA: June, 2025)或更高版本。請將 GlobalProtect App 6.1 on Windows, macOS 所有版本更新至6.2.8-h2 [ETA June 2025] 或 6.3.3 或更高版本。請將 GlobalProtect App 6.0 on Windows, macOS 所有版本更新至6.2.8-h2 [ETA June 2025] 或 6.3.3 或更高版本       情資報告連結:https://security.paloaltonetworks.com/CVE-2025-4229https://security.paloaltonetworks.com/CVE-2025-4230https://security.paloaltonetworks.com/CVE-2025-4231https://security.paloaltonetworks.com/CVE-2025-4227https://security.paloaltonetworks.com/CVE-2025-4232 https://www.kjintelligent.com/en/hot_517218.html [Cybersecurity Vulnerability Notice] Palo Alto 2025-06-20 2026-06-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_517218.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_517218.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2025-06-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_517218.html



【雲智維資安預警通知】

漏洞分享 - Moxa路由器存在未經授權存取和操作系統命令注入漏洞
Moxa 旗下部分行動通訊路由器、安全路由器、網路設備存在高風險漏洞CVE-2024-9137、CVE-2024-9139,並指出這些漏洞有可能導致未經授權存取或是系統損壞的情況。
  • CVE-2024-9137影響之產品下:
  • EDR-8010 Series Firmware version 3.12.1 and earlier versions
  • EDR-G9004 Seires Firmware version 3.12.1 and earlier versions
  • EDR-G9010 Series Firmware version 3.12.1 and earlier versions
  • EDR-G1002-BP Series Firmware version 3.12.1 and earlier versions
  • NAT-102 Series Firmware version 1.0.5 and earlier versions
  • OnCell G4302-LTE4 Series Firmware version 3.9 and earlier versions
  • TN-4900 Series Firmware version 3.6 and earlier versions
  • CVE-2024-9139:影響之產品如下:
  • EDR-8010 Series Firmware version 3.12.1 and earlier versions
  • EDR-G9004 Seires Firmware version 3.12.1 and earlier versions
  • EDR-G9010 Series Firmware version 3.12.1 and earlier versions
  • EDF-G1002-BP Series Firmware version 3.12.1 and earlier versions
  • NAT-102 Series Firmware version 1.0.5 and earlier versions
  • OnCell G4302-LTE4 Series Firmware version 3.9 and earlier versions
  • TN-4900 Series Firmware version 3.6 and earlier versions

  • 建議改善措施:
1. 企業及使用者如有上述漏洞版本應儘速更新至以下版本:
EDR-8010 Series Upgrade to the firmware version 3.13
EDR-G9004 Series Upgrade to the firmware version 3.13
EDR-G9010 Series Upgrade to the firmware version 3.13
EDF-G1002-BP Series Upgrade to the firmware version 3.13
NAT-102 Series Please contact Moxa Technical Support for the security patch
OnCell G4302-LTE4 Series Upgrade to the firmware version 3.13
TN-4900 Series Upgrade to the firmware version 3.13

2. 對於無法即時套用新版韌體的企業組織,緩解措施建議減少裝置曝露於網際網路、透過防火牆限制存取(白名單),以及採用入侵偵測系統(IDS)、入侵防禦系統(IPS)來偵測及防範漏洞利用的情況。

Previous Back to List Next