A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 | Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 06:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 - Third Party Advisory, US Government Resource |
Information
Published : 2021-10-12 14:15
Updated : 2024-11-21 06:17
NVD link : CVE-2021-38458
Mitre link : CVE-2021-38458
CVE.ORG link : CVE-2021-38458
JSON object : View
Products Affected
moxa
- mxview
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')