The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused due to sensitive information exposure.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-05 | Third Party Advisory US Government Resource |
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-09-21 05:15
Updated : 2024-09-27 18:59
NVD link : CVE-2024-6785
Mitre link : CVE-2024-6785
CVE.ORG link : CVE-2024-6785
JSON object : View
Products Affected
moxa
- mxview_one
- mxview_one_central_manager