First published: Fri Oct 18 2024(Updated: )
MXsecurity software versions v1.1.0 and prior are vulnerable because of the use of hard-coded credentials. This vulnerability could allow an attacker to tamper with sensitive data.
Credit: psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa MXsecurity Series | <=1.1.0 |
Moxa has developed an appropriate solution to address the vulnerability. The solution for the affected product is shown below. * MXsecurity: Please upgrade to the firmware version 2.2.0 or higher via the Moxa Software Licensing Portal https://netsecuritylicense.moxa.com/Account/Login
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4740 has a high severity rating due to the exploitation of hard-coded credentials.
To fix CVE-2024-4740, update the MXsecurity software to version 1.1.1 or later, which eliminates the use of hard-coded credentials.
The risks associated with CVE-2024-4740 include potential unauthorized access to sensitive data and the possibility of data tampering.
All Moxa MXsecurity software versions v1.1.0 and prior are affected by CVE-2024-4740.
Yes, CVE-2024-4740 can be exploited remotely if an attacker obtains the hard-coded credentials.