Moxa MXview Network Management Software
MXview Network Management Software versions 3.x through 3.2.2 contain multiple critical vulnerabilities: path traversal (CWE-22) allowing attackers to read/write arbitrary files, hardcoded credentials (CWE-259) for authentication bypass, unsafe template processing (CWE-74) for code injection, and insufficient access controls (CWE-284). These can be exploited remotely without authentication to execute code, steal credentials, disable the software, modify device configurations, or gain unauthorized MQTT access to internal communication channels.
- Network access to MXview management server (typically port 8080 or 8443)
- No authentication required for exploitation
- MXview version 3.2.2 or earlier running
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9504a528-79b4-427a-83bd-6222a10fb40eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.