ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Critical connectivity in automation is not just about having a fast connection; it is about making people's lives better and more secure. Moxa's connectivity technology helps to make your ideas real. We develop reliable network solutions that enable devices to connect, communicate, and collaborate with systems, processes, and people.

Moxa A.I CyberSecurity Scoring

Moxa

Company Details

Linkedin ID:

moxa

Employees number:

1,382

Number of followers:

56,573

NAICS:

33325

Industry Type:

Automation Machinery Manufacturing

Homepage:

moxa.com

IP Addresses:

0

Company ID:

MOX_2814638

Scan Status:

In-progress

AI scoreMoxa Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/moxa.jpeg
Moxa Automation Machinery Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreMoxa Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/moxa.jpeg
Moxa Automation Machinery Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Moxa Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
MoxaVulnerability10056/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: A critical flaw in Moxa’s industrial Ethernet switches, CVE-2024-12297, risks compromising device integrity allowing unauthorized access to sensitive industrial systems. Successful exploitation could result in full administrative access, network segmentation breaches, traffic interception, and disruption of critical infrastructure operations such as power grids and manufacturing plants. The vulnerability exhibits high exploitable potential due to its network attack vector and low attack complexity. Moxa has issued firmware patches to mitigate the flaw, and authorities like the UAE Cyber Security Council have emphasized the importance of patching against the backdrop of potential severe impacts in critical sectors like oil, gas, and transportation.

Moxa
Vulnerability
Severity: 100
Impact: 5
Seen: 6/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: A critical flaw in Moxa’s industrial Ethernet switches, CVE-2024-12297, risks compromising device integrity allowing unauthorized access to sensitive industrial systems. Successful exploitation could result in full administrative access, network segmentation breaches, traffic interception, and disruption of critical infrastructure operations such as power grids and manufacturing plants. The vulnerability exhibits high exploitable potential due to its network attack vector and low attack complexity. Moxa has issued firmware patches to mitigate the flaw, and authorities like the UAE Cyber Security Council have emphasized the importance of patching against the backdrop of potential severe impacts in critical sectors like oil, gas, and transportation.

Ailogo

Moxa Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Moxa

Incidents vs Automation Machinery Manufacturing Industry Average (This Year)

No incidents recorded for Moxa in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Moxa in 2025.

Incident Types Moxa vs Automation Machinery Manufacturing Industry Avg (This Year)

No incidents recorded for Moxa in 2025.

Incident History — Moxa (X = Date, Y = Severity)

Moxa cyber incidents detection timeline including parent company and subsidiaries

Moxa Company Subsidiaries

SubsidiaryImage

Critical connectivity in automation is not just about having a fast connection; it is about making people's lives better and more secure. Moxa's connectivity technology helps to make your ideas real. We develop reliable network solutions that enable devices to connect, communicate, and collaborate with systems, processes, and people.

Loading...
similarCompanies

Moxa Similar Companies

Emerson

Emerson is a leading global technology, software, and engineering company providing innovative solutions for customers in industrial and commercial markets. We help customers in the world’s most essential industries solve the biggest challenges of modern life. Every day, our global workforce fulfil

PT Astra International Tbk

Astra was established in 1957 as a trading company. Over the course of its development, Astra has formed a number of strategic alliances with leading global players. Since 1990, the Company has been listed on the Indonesia Stock Exchange. Astra currently engages in seven business lines: Autom

ABB is a technology leader in electrification and automation, enabling a more sustainable and resource-efficient future. The company’s solutions connect engineering know-how and software to optimize how things are manufactured, moved, powered and operated. Building on over 140 years of excellence, A

Siemens

Siemens AG (Berlin and Munich) is a leading technology company focused on industry, infrastructure, mobility, and healthcare. The company’s purpose is to create technology to transform the everyday, for everyone. By combining the real and the digital worlds, Siemens empowers customers to accelerate

Schneider Electric

Schneider Electric is a global energy technology leader, driving efficiency and sustainability by electrifying, automating, and digitalizing industries, businesses, and homes. Its technologies enable buildings, data centers, factories, infrastructure, and grids to operate as open, interconnected e

KUKA SE & Co. KGaA is a global leader in intelligent automation solutions, generating around 3.7 billion euro in sales and employing approximately 15,000 people worldwide. Headquartered in Augsburg, Germany, KUKA’s mission is to make automation accessible for everyone - simple, intuitive and sustain

newsone

Moxa CyberSecurity News

October 27, 2025 07:00 AM
⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens

Active WSUS exploits, LockBit 5.0's comeback, a Telegram backdoor, and F5's hidden breach — this week's biggest cyber threats.

October 23, 2025 07:00 AM
Secure and Connected OT Networks

At SPS 2025 (Hall 5, Booth 419), Moxa Europe will present its latest solutions for building secure, reliable, and future-ready OT networks.

October 20, 2025 07:00 AM
Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)

Moxa fixed 5 vulnerabilities in its industrial network security appliances and routers, including CVE-2025-6950 (hard-coded credentials).

September 19, 2025 07:00 AM
MEICA EXPO 2025: Global leaders unite in Abu Dhabi to propel industrial innovation and cybersecurity

Abu Dhabi: The 6th Annual Middle East Instrumentation Cybersecurity and Automation EXPO (MEICA) marked a successful opening at Rixos Marina,...

March 11, 2025 07:00 AM
Moxa Issues Fix for Critical Authentication Bypass Vulnerability in PT Switches

Moxa has released a security update to address a critical security flaw impacting its PT switches that could permit an attacker to bypass authentication...

March 10, 2025 07:00 AM
Moxa Industrial Ethernet Switches Vulnerability Let Attackers Gain Admin Access

A critical security flaw in Moxa's PT series industrial Ethernet switches enables attackers to bypass authentication mechanisms and...

March 10, 2025 07:00 AM
Critical Vulnerabilities in Moxa Switches Enable Unauthorized Access

A critical vulnerability identified as CVE-2024-12297 has been discovered in Moxa's PT series of network switches, affecting multiple...

January 13, 2025 08:00 AM
Singapore’s CSA issues urgent advisory on Mirai botnet threat to industrial routers, smart home devices

The Cyber Security Agency of Singapore (CSA) addressed reports of an ongoing Mirai-based botnet campaign targeting security flaws in industrial routers and...

January 08, 2025 08:00 AM
Critical Vulnerabilities in Moxa Routers Allow Root Privilege Escalation

Critical security vulnerabilities have been found in Moxa cellular routers and network security appliances. Learn about CVE-2024-9138...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Moxa CyberSecurity History Information

Official Website of Moxa

The official website of Moxa is https://www.moxa.com/.

Moxa’s AI-Generated Cybersecurity Score

According to Rankiteo, Moxa’s AI-generated cybersecurity score is 760, reflecting their Fair security posture.

How many security badges does Moxa’ have ?

According to Rankiteo, Moxa currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Moxa have SOC 2 Type 1 certification ?

According to Rankiteo, Moxa is not certified under SOC 2 Type 1.

Does Moxa have SOC 2 Type 2 certification ?

According to Rankiteo, Moxa does not hold a SOC 2 Type 2 certification.

Does Moxa comply with GDPR ?

According to Rankiteo, Moxa is not listed as GDPR compliant.

Does Moxa have PCI DSS certification ?

According to Rankiteo, Moxa does not currently maintain PCI DSS compliance.

Does Moxa comply with HIPAA ?

According to Rankiteo, Moxa is not compliant with HIPAA regulations.

Does Moxa have ISO 27001 certification ?

According to Rankiteo,Moxa is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Moxa

Moxa operates primarily in the Automation Machinery Manufacturing industry.

Number of Employees at Moxa

Moxa employs approximately 1,382 people worldwide.

Subsidiaries Owned by Moxa

Moxa presently has no subsidiaries across any sectors.

Moxa’s LinkedIn Followers

Moxa’s official LinkedIn profile has approximately 56,573 followers.

NAICS Classification of Moxa

Moxa is classified under the NAICS code 33325, which corresponds to Others.

Moxa’s Presence on Crunchbase

No, Moxa does not have a profile on Crunchbase.

Moxa’s Presence on LinkedIn

Yes, Moxa maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/moxa.

Cybersecurity Incidents Involving Moxa

As of December 04, 2025, Rankiteo reports that Moxa has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Moxa has an estimated 3,195 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Moxa ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does Moxa detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with firmware patches..

Incident Details

Can you provide details on each incident ?

Incident : Vulnerability Exploit

Title: Critical Flaw in Moxa’s Industrial Ethernet Switches

Description: A critical flaw in Moxa’s industrial Ethernet switches, CVE-2024-12297, risks compromising device integrity allowing unauthorized access to sensitive industrial systems. Successful exploitation could result in full administrative access, network segmentation breaches, traffic interception, and disruption of critical infrastructure operations such as power grids and manufacturing plants. The vulnerability exhibits high exploitable potential due to its network attack vector and low attack complexity. Moxa has issued firmware patches to mitigate the flaw, and authorities like the UAE Cyber Security Council have emphasized the importance of patching against the backdrop of potential severe impacts in critical sectors like oil, gas, and transportation.

Type: Vulnerability Exploit

Attack Vector: Network

Vulnerability Exploited: CVE-2024-12297

Motivation: Unauthorized Access

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Impact of the Incidents

What was the impact of each incident ?

Incident : Vulnerability Exploit MOX225031025

Systems Affected: Industrial Ethernet Switches

Operational Impact: Disruption of critical infrastructure operations

Which entities were affected by each incident ?

Incident : Vulnerability Exploit MOX225031025

Entity Name: Moxa

Entity Type: Company

Industry: Industrial Automation

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Vulnerability Exploit MOX225031025

Remediation Measures: Firmware Patches

Data Breach Information

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Firmware Patches, .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Vulnerability Exploit MOX225031025

Lessons Learned: Importance of patching against severe vulnerabilities in critical sectors.

What recommendations were made to prevent future incidents ?

Incident : Vulnerability Exploit MOX225031025

Recommendations: Regularly apply firmware patches and follow advisories from authorities like the UAE Cyber Security Council.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Importance of patching against severe vulnerabilities in critical sectors.

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Regularly apply firmware patches and follow advisories from authorities like the UAE Cyber Security Council..

Additional Questions

Impact of the Incidents

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Industrial Ethernet Switches.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Importance of patching against severe vulnerabilities in critical sectors.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Regularly apply firmware patches and follow advisories from authorities like the UAE Cyber Security Council..

cve

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=moxa' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge