First published: Thu Nov 05 2020(Updated: )
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary.By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality and among them the mosquitto executable is also run.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa MXview | =3.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13537 is an exploitable local privilege elevation vulnerability in the file system permissions of Moxa MXView series 3.1.8 installation.
CVE-2020-13537 can allow an attacker to add code to a script or replace a binary, potentially leading to privilege escalation.
CVE-2020-13537 has a severity rating of 7.8 (out of 10), indicating a critical vulnerability.
At the time of writing, there is no fix available for CVE-2020-13537. It is recommended to implement mitigations provided by the vendor or security advisories.
You can find more information about CVE-2020-13537 at the following link: [https://talosintelligence.com/vulnerability_reports/TALOS-2020-1148]