First published: Sat Sep 21 2024(Updated: )
The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused due to sensitive information exposure.
Credit: psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa MXview One Series | <1.4.1 | |
Moxa MXview One Series | =1.0.0 |
Moxa has developed appropriate solutions to address vulnerability. The solutions for affected products are listed below. * MXview One Series: Upgrade to the 1.4.1 version * MXview One Central Manager Series: Upgrade to the 1.0.3 version
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6785 is considered a high severity vulnerability due to the potential for sensitive information exposure.
To fix CVE-2024-6785, ensure that the configuration file does not store sensitive credentials in cleartext and implement proper encryption methods.
CVE-2024-6785 affects Moxa MXView One and MXView One Central Manager software, particularly versions up to 1.4.1 and exactly 1.0.0 respectively.
The risks associated with CVE-2024-6785 include unauthorized local access, modification of configuration files, and abuse of services leading to exposure of sensitive information.
An attacker with local access rights can exploit CVE-2024-6785 to read or modify the vulnerable configuration files.