A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 | Third Party Advisory US Government Resource |
Configurations
History
28 Oct 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords |
19 Oct 2021, 13:48
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 - Third Party Advisory, US Government Resource | |
CWE | CWE-798 | |
CPE | cpe:2.3:a:moxa:mxview:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
12 Oct 2021, 15:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-12 14:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-38456
Mitre link : CVE-2021-38456
CVE.ORG link : CVE-2021-38456
JSON object : View
Products Affected
moxa
- mxview