PLANET IGS-6325-16P4S / NMS-500
CVE
Summary
PLANET Technology has identified and addressed security vulnerabilities affecting the industrial L2+ managed switch IGS-6325-16P4S and the network management system NMS-500. The issues include an SSH Terrapin prefix truncation weakness on IGS-6325-16P4S and multiple cross-site scripting (XSS) vulnerabilities in the jQuery library used by NMS-500. Successful exploitation could allow an attacker to downgrade SSH connection security or perform XSS attacks through crafted web requests. Patched firmware for both products has been fully verified and released. The updates are now available for download from the PLANET official website. All users are strongly recommended to upgrade immediately
What Are the Risks Associated with This Vulnerability?

CVE-2023-48795 (SSH Terrapin Prefix Truncation / MITM):

May allow a man-in-the-middle attacker to tamper with the SSH handshake, bypass certain integrity checks, and weaken the security of the encrypted connection.

CVE-2020-11022 & CVE-2020-11023 (jQuery < 3.5.0 Multiple XSS / CWE-79):

May allow remote attackers to inject or execute arbitrary JavaScript in the context of the NMS-500 web interface when specially crafted input is processed, potentially leading to information disclosure, session hijacking, or UI manipulation.

Which Versions Are Affected and What Should You Do?
After a comprehensive investigation, we have identified the impacted product versions and released updated firmware to mitigate this vulnerability. The affected products and available patches are listed in the table below:
Product Series Affected Version Patch Availability
IGS-6325-16P4S Versions V2.2312b240628 and prior V2.2412b250930
NMS-500 Versions V1.0b250410 and prior V1.0b250926

How to Get Assistance
If you have any questions or require assistance, please contact PLANET's technical support team or reach out to your PLANET distributor. We are here to provide additional guidance and support.
Acknowledgment
We would like to express our appreciation to our customer and their security evaluation team for reporting this issue.
Revision History
[2025-11-12]: Initial Version
Contact Us