First published: Fri Oct 18 2024(Updated: )
The lack of access restriction to a resource from unauthorized users makes MXsecurity software versions v1.1.0 and prior vulnerable. By acquiring a valid authenticator, an attacker can pose as an authorized user and successfully access the resource.
Credit: psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa MXsecurity Series | <=1.1.0 |
Moxa has developed an appropriate solution to address the vulnerability. The solution for the affected product is shown below. * MXsecurity: Please Upgrade to the firmware version 2.2.0 or higher via the Moxa Software Licensing Portal https://netsecuritylicense.moxa.com/Account/Login
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4739 is classified as a high severity vulnerability due to unauthorized access potential.
To fix CVE-2024-4739, upgrade to a version of MXsecurity software later than v1.1.0.
CVE-2024-4739 is caused by a lack of access restriction to resources, allowing unauthorized users to exploit the vulnerability.
MXsecurity software versions v1.1.0 and prior are affected by CVE-2024-4739.
No, an attacker must acquire a valid authenticator to exploit CVE-2024-4739.