First published: Fri Apr 14 2017(Updated: )
Moxa MXView 2.8 allows remote attackers to read web server's private key file, no access control.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa MXview One Series | =2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7455 is classified as a critical vulnerability due to its potential to allow unauthorized access to sensitive private key files.
To mitigate CVE-2017-7455, users should upgrade to a patched version of Moxa MXView or apply specific security configurations to restrict access.
The primary risk of CVE-2017-7455 is the exposure of private key material, which could lead to unauthorized interception of encrypted communications.
Devices running Moxa MXView version 2.8 are directly affected by CVE-2017-7455.
Yes, CVE-2017-7455 can be exploited remotely, allowing attackers to read sensitive files without authentication.