A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 | Third Party Advisory US Government Resource |
Configurations
History
19 Oct 2021, 13:34
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:moxa:mxview:*:*:*:*:*:*:*:* | |
References | (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 9.1 |
12 Oct 2021, 15:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-12 14:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-38452
Mitre link : CVE-2021-38452
CVE.ORG link : CVE-2021-38452
JSON object : View
Products Affected
moxa
- mxview
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')