First published: Tue Oct 05 2021(Updated: )
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa MXview | >=3.0<=3.2.2 | |
Moxa MXview Network Management Software: Versions 3.x to 3.2.2 |
Moxa recommends users do the following: Upgrade to software package v3.2.4 or higher. Users should change their Windows password regularly and use a firewall. If users need to use a multiple-site function, Moxa recommends a firewall to block Port 8883. If users do not have this requirement, Moxa suggests using the firewall to assign the Accessible IP of MXview at the client site.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-38458.
The title of this vulnerability is 'A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2'.
The description of this vulnerability is a path traversal vulnerability in the Moxa MXview Network Management software that may allow an attacker to create or overwrite critical files used to execute code.
The affected software for this vulnerability is Moxa MXview Network Management software Versions 3.x to 3.2.2.
The severity of this vulnerability is critical with a CVSS score of 9.8.
Yes, there is an official reference for this vulnerability. You can find it at [here](https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03).
The CWE IDs associated with this vulnerability are CWE-22 and CWE-74.