Vulnerability Description
The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused due to sensitive information exposure.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Moxa | Mxview One | < 1.4.1 |
| Moxa | Mxview One Central Manager | 1.0.0 |
Related Weaknesses (CWE)
References
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-05Third Party AdvisoryUS Government Resource
- https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-muPatchVendor Advisory
FAQ
What is CVE-2024-6785?
CVE-2024-6785 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused due to sensiti...
How severe is CVE-2024-6785?
CVE-2024-6785 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6785?
Check the references section above for vendor advisories and patch information. Affected products include: Moxa Mxview One, Moxa Mxview One Central Manager.