Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
* Last update: 05/02/2026
* Affected products:
→ EDR-G9010 Series v3.14 and earlier
→ EDR-8010 Series v3.17 and earlier
→ EDF-G1002-BP Series v3.17 and earlier
→ TN-4900 Series v3.14 and earlier
→ NAT-102 Series v3.17 and earlier
→ NAT-108 Series v3.16 and earlier
→ OnCell G4302-LTE4 Series v3.13 and earlier* Type: Incorrect Authorization, Execution with Unnecessary Privileges, Use of Hard-coded Credentials
* CVE/CVSS:
- CVE-2025-6892: CVSS 8.7 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H)
- CVE-2025-6893: CVSS 9.3 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H)
- CVE-2025-6894: CVSS 5.3 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N)
- CVE-2025-6949: CVSS 9.3 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H)
- CVE-2025-6950: CVSS 9.9 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H)
Moxa
Successful exploitation of vulnerabilities in Moxa industrial network appliances allows:
These vulnerabilities critically affect the confidentiality, integrity, and availability of Moxa devices and connected systems. Exploitation could allow attackers to gain unauthorised administrative access, execute commands with elevated privileges, and pivot into ICS/OT networks, potentially causing operational disruption or data manipulation.
Given the combination of authenticated and unauthenticated attack vectors, there is a credible risk of attackers chaining these flaws for escalated impact.
In affected firmware versions, multiple Moxa industrial network appliances suffer from several critical vulnerabilities. These flaws allow attackers to:
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/cert/report-incident.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.
CVE.org