First published: Sat Sep 21 2024(Updated: )
This vulnerability occurs when an attacker exploits a race condition between the time a file is checked and the time it is used (TOCTOU). By exploiting this race condition, an attacker can write arbitrary files to the system. This could allow the attacker to execute malicious code and potentially cause file losses.
Credit: psirt@moxa.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa MXview Network Management Software | <1.4.1 |
Moxa has developed appropriate solutions to address vulnerability. The solutions for affected products are listed below. * MXview One Series: Upgrade to the 1.4.1 version
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6787 has been assigned a high severity level due to its potential impact, allowing attackers to execute arbitrary file writes.
To mitigate CVE-2024-6787, users should update Moxa Mxview One to version 1.4.1 or later, where this vulnerability is addressed.
An attacker can exploit CVE-2024-6787 to write arbitrary files, potentially leading to the execution of malicious code.
CVE-2024-6787 affects all versions of Moxa Mxview One prior to 1.4.1.
In CVE-2024-6787, a race condition occurs between the time a file is checked and when it is used, allowing timed exploitation by an attacker.