First published: Sat Sep 21 2024(Updated: )
The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused due to sensitive information exposure.
Credit: psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Mxview One | <1.4.1 | |
Moxa Mxview One Central Manager | =1.0.0 |
Moxa has developed appropriate solutions to address vulnerability. The solutions for affected products are listed below. * MXview One Series: Upgrade to the 1.4.1 version * MXview One Central Manager Series: Upgrade to the 1.0.3 version
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.