A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords
Advisories
Source ID Title
EUVD EUVD EUVD-2021-24908 A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords
Fixes

Solution

Moxa recommends users do the following: Upgrade to software package v3.2.4 or higher. Users should change their Windows password regularly and use a firewall. If users need to use a multiple-site function, Moxa recommends a firewall to block Port 8883. If users do not have this requirement, Moxa suggests using the firewall to assign the Accessible IP of MXview at the client site.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-17T03:58:44.651Z

Reserved: 2021-08-10T00:00:00

Link: CVE-2021-38456

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-12T14:15:08.503

Modified: 2024-11-21T06:17:08.600

Link: CVE-2021-38456

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.