First published: Thu Nov 05 2020(Updated: )
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary. By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa MXview | =3.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-13536.
The severity of CVE-2020-13536 is critical with a CVSS score of 7.8.
The affected software is Moxa MXView series 3.1.8.
An attacker can exploit CVE-2020-13536 by adding code to a script or replacing a binary.
At the moment, there is no information available regarding a fix for CVE-2020-13536. It is recommended to follow the vendor's advisories for any updates.