Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-47816 | The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets. |
Solution
Moxa has developed appropriate solutions to address vulnerability. The solutions for affected products are listed below. * MXview One Series: Upgrade to the 1.4.1 version
Workaround
* Minimize network exposure to ensure the device is not accessible from the Internet. * It is highly recommended to change the default credentials immediately upon your first login to the service. This helps enhance security and prevent unauthorized access.
Mon, 30 Sep 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Moxa
Moxa mxview One |
|
Weaknesses | CWE-22 | |
CPEs | cpe:2.3:a:moxa:mxview_one:*:*:*:*:*:*:*:* | |
Vendors & Products |
Moxa
Moxa mxview One |
Thu, 26 Sep 2024 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 23 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 21 Sep 2024 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets. | |
Title | MXview One Series vulnerable to Path Traversal | |
Weaknesses | CWE-24 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2024-09-26T06:52:45.192Z
Reserved: 2024-07-16T09:32:41.142Z
Link: CVE-2024-6786

Updated: 2024-09-23T14:04:59.751Z

Status : Analyzed
Published: 2024-09-21T05:15:12.397
Modified: 2024-09-30T18:31:50.473
Link: CVE-2024-6786

No data.

No data.