The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-47816 The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets.
Fixes

Solution

Moxa has developed appropriate solutions to address vulnerability. The solutions for affected products are listed below. * MXview One Series: Upgrade to the 1.4.1 version


Workaround

* Minimize network exposure to ensure the device is not accessible from the Internet. * It is highly recommended to change the default credentials immediately upon your first login to the service. This helps enhance security and prevent unauthorized access.

History

Mon, 30 Sep 2024 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Moxa
Moxa mxview One
Weaknesses CWE-22
CPEs cpe:2.3:a:moxa:mxview_one:*:*:*:*:*:*:*:*
Vendors & Products Moxa
Moxa mxview One

Thu, 26 Sep 2024 07:00:00 +0000

Type Values Removed Values Added
References

Mon, 23 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 21 Sep 2024 04:30:00 +0000

Type Values Removed Values Added
Description The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets.
Title MXview One Series vulnerable to Path Traversal
Weaknesses CWE-24
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Moxa

Published:

Updated: 2024-09-26T06:52:45.192Z

Reserved: 2024-07-16T09:32:41.142Z

Link: CVE-2024-6786

cve-icon Vulnrichment

Updated: 2024-09-23T14:04:59.751Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-21T05:15:12.397

Modified: 2024-09-30T18:31:50.473

Link: CVE-2024-6786

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.