First published: Sat Sep 21 2024(Updated: )
The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets.
Credit: psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa MXview One Series | <1.4.1 |
Moxa has developed appropriate solutions to address vulnerability. The solutions for affected products are listed below. * MXview One Series: Upgrade to the 1.4.1 version
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6786 is considered a high-severity vulnerability due to its potential for disclosing sensitive information.
To fix CVE-2024-6786, update your Moxa Mxview One software to version 1.4.1 or later.
CVE-2024-6786 affects the Moxa Mxview One software versions prior to 1.4.1.
CVE-2024-6786 enables an attacker to perform path traversal attacks via crafted MQTT messages.
CVE-2024-6786 may allow attackers to read arbitrary files, potentially exposing configuration files and JWT signing secrets.