CVE-2020-13537

An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary.By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality and among them the mosquitto executable is also run.
Configurations

Configuration 1 (hide)

cpe:2.3:a:moxa:mxview:3.1.8:*:*:*:*:*:*:*

History

21 Nov 2024, 05:01

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1148 - Exploit, Third Party Advisory () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1148 - Exploit, Third Party Advisory

Information

Published : 2020-11-05 21:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13537

Mitre link : CVE-2020-13537

CVE.ORG link : CVE-2020-13537


JSON object : View

Products Affected

moxa

  • mxview
CWE
CWE-276

Incorrect Default Permissions