当前位置:网站首页>Serious security vulnerabilities reported by moxa mxview network management software
Serious security vulnerabilities reported by moxa mxview network management software
2022-07-03 02:40:00 【Khan security team】
Some effects have been disclosed Moxa MXview be based on Web Technical details of the security vulnerability of the network management system , Some of them may be linked by unauthenticated attackers , To achieve remote code execution on unpatched servers .
Claroty Security researcher Noam Moshe In a report released this week , These five security vulnerabilities “ May allow remote 、 An unauthenticated attacker executes code on the host with the highest available privileges :NT AUTHORITY\SYSTEM” .
Moxa MXview Designed to configure 、 Designed to monitor and diagnose network equipment in Industrial Networks . These affect network management software 3.x to 3.2.2 The defect of the version is 2021 year 10 After the coordinated disclosure process in January, it will be in 3.2.4 Or later .
“ Successful exploitation of these vulnerabilities may allow attackers to create or overwrite critical files to execute code 、 Access program 、 Obtain the credentials 、 Disable Software 、 Read and modify other inaccessible data 、 Allow remote connection to internal communication channels or interaction and remote use MQTT,” U.S. cybersecurity and Infrastructure Security Agency (CISA) In an announcement, it said .
MQTT It refers to a message passing protocol that promotes remote asynchronous communication , Support in MXview Messages are transferred between different components in the environment .
The list of defects is as follows ——
- CVE-2021-38452(CVSS score :7.5)- Path traversal vulnerability in applications , Allow access to or overwrite key files used to execute code
- CVE-2021-38454(CVSS fraction :10.0)- Allow remote connections to MQTT Misconfigured service , Thus, it can interact and use communication channels remotely
- CVE-2021-38456(CVSS fraction :9.8)- Use hard coded passwords
- CVE-2021-38458(CVSS fraction :9.8)- Improper neutralization of special elements , It may cause unauthorized commands to be executed remotely
- CVE-2021-38460(CVSS fraction :7.5)- Password disclosure cases that may allow attackers to obtain credentials
The above three vulnerabilities ——CVE-2021-38452、CVE-2021-38454 and CVE-2021-38458 Can be strung together , In vulnerable areas with system privileges MXView Implement pre validated remote code execution on the instance .
stay Claroty In the hypothetical attack scenario designed ,CVE-2021-38452 May be abused , By reading the configuration file gateway-upper.ini To get plain text MQTT password , And then use it CVE-2021-38454 Inject hooligans MQTT news , The command injection on the server triggers code execution .
“ The attacker directed at MQTT The agent injects malicious messages , Bypass all input validation performed by the server , And pass OS Command injection vulnerability enables arbitrary remote code execution ,”Moshe explains .
边栏推荐
- Simple understanding of SVG
- [flutter] example of asynchronous programming code between future and futurebuilder (futurebuilder constructor setting | handling flutter Chinese garbled | complete code example)
- GBase 8c系统表-pg_class
- Add automatic model generation function to hade
- GBase 8c系统表pg_cast
- [shutter] banner carousel component (shutter_wiper plug-in | swiper component)
- The left value and the right finger explain better
- 【翻译】后台项目加入了CNCF孵化器
- GBase 8c 函数/存储过程参数(一)
- 【翻译】具有集中控制平面的现代应用负载平衡
猜你喜欢

Random Shuffle attention

easyExcel

Thread safe singleton mode
![[flutter] example of asynchronous programming code between future and futurebuilder (futurebuilder constructor setting | handling flutter Chinese garbled | complete code example)](/img/04/88ce45d370a2e6052c2fce558aa531.jpg)
[flutter] example of asynchronous programming code between future and futurebuilder (futurebuilder constructor setting | handling flutter Chinese garbled | complete code example)

Today, it's time to copy the bottom!

Matlab tips (24) RBF, GRNN, PNN neural network

Principle and application of database

Oauth2.0 authentication, login and access "/oauth/token", how to get the value of request header authorization (basictoken)???

MATLAB小技巧(24)RBF,GRNN,PNN-神经网络
![[fluent] JSON model conversion (JSON serialization tool | JSON manual serialization | writing dart model classes according to JSON | online automatic conversion of dart classes according to JSON)](/img/6a/ae44ddb090ce6373f04a550a15f973.jpg)
[fluent] JSON model conversion (JSON serialization tool | JSON manual serialization | writing dart model classes according to JSON | online automatic conversion of dart classes according to JSON)
随机推荐
The use of Flink CDC mongodb and the implementation of Flink SQL parsing complex nested JSON data in monggo
Didi programmers are despised by relatives: an annual salary of 800000 is not as good as two teachers
Gbase 8C system table PG_ am
Gbase 8C create user / role example 2
random shuffle注意
【教程】chrome關閉跨域策略cors、samesite,跨域帶上cookie
GBase 8c系统表-pg_aggregate
Random shuffle note
Simple understanding of SVG
How to change the panet layer in yolov5 to bifpn
簡單理解svg
简单理解svg
GBase 8c 创建用户/角色 示例二
Word word word
SQL Server Query spécifie la structure de la table
"Analysis of 43 cases of MATLAB neural network": Chapter 43 efficient programming skills of neural network -- Discussion Based on the characteristics of the new version of MATLAB r2012b
Awk from getting started to getting into the ground (3) the built-in functions printf and print of awk realize formatted printing
GBase 8c系统表pg_cast
SQL server queries the table structure of the specified table
Matlab tips (24) RBF, GRNN, PNN neural network