First published: Tue Oct 12 2021(Updated: )
A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa MXview | >=3.0<=3.2.2 | |
Moxa MXview Network Management Software: Versions 3.x to 3.2.2 |
Moxa recommends users do the following: Upgrade to software package v3.2.4 or higher. Users should change their Windows password regularly and use a firewall. If users need to use a multiple-site function, Moxa recommends a firewall to block Port 8883. If users do not have this requirement, Moxa suggests using the firewall to assign the Accessible IP of MXview at the client site.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38456 is a use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2.
CVE-2021-38456 has a severity rating of 9.8 (critical).
Moxa MXview Network Management software Versions 3.x to 3.2.2 are affected by CVE-2021-38456.
An attacker can exploit CVE-2021-38456 by gaining access through accounts using default passwords.
Yes, it is recommended to update to a version higher than 3.2.2 to fix CVE-2021-38456.