Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-24906 | A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. |
Solution
Moxa recommends users do the following: Upgrade to software package v3.2.4 or higher. Users should change their Windows password regularly and use a firewall. If users need to use a multiple-site function, Moxa recommends a firewall to block Port 8883. If users do not have this requirement, Moxa suggests using the firewall to assign the Accessible IP of MXview at the client site.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 |
![]() ![]() |
No history.

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-16T23:22:08.753Z
Reserved: 2021-08-10T00:00:00
Link: CVE-2021-38454

No data.

Status : Modified
Published: 2021-10-12T14:15:08.443
Modified: 2024-11-21T06:17:08.287
Link: CVE-2021-38454

No data.

No data.