A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-24904 A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
Fixes

Solution

Moxa recommends users do the following: Upgrade to software package v3.2.4 or higher. Users should change their Windows password regularly and use a firewall. If users need to use a multiple-site function, Moxa recommends a firewall to block Port 8883. If users do not have this requirement, Moxa suggests using the firewall to assign the Accessible IP of MXview at the client site.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-16T16:17:53.926Z

Reserved: 2021-08-10T00:00:00

Link: CVE-2021-38452

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-12T14:15:08.347

Modified: 2024-11-21T06:17:08.000

Link: CVE-2021-38452

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.