An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary. By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1148 | third party advisory exploit |