CVE-2021-38456

A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:moxa:mxview:*:*:*:*:*:*:*:*

History

28 Oct 2021, 13:15

Type Values Removed Values Added
Summary A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords

19 Oct 2021, 13:48

Type Values Removed Values Added
References (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 - (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 - Third Party Advisory, US Government Resource
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CPE cpe:2.3:a:moxa:mxview:*:*:*:*:*:*:*:*
CWE CWE-259 CWE-798

12 Oct 2021, 15:17

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-12 14:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-38456

Mitre link : CVE-2021-38456

CVE.ORG link : CVE-2021-38456


JSON object : View

Products Affected

moxa

  • mxview
CWE
CWE-798

Use of Hard-coded Credentials

CWE-259

Use of Hard-coded Password