CVE-2024-4740

MXsecurity Use of Hard-coded Credentials

Description

MXsecurity software versions v1.1.0 and prior are vulnerable because of the use of hard-coded credentials. This vulnerability could allow an attacker to tamper with sensitive data.

Remediation

Solution:

  • Moxa has developed an appropriate solution to address the vulnerability. The solution for the affected product is shown below. * MXsecurity: Please upgrade to the firmware version 2.2.0 or higher via the Moxa Software Licensing Portal https://netsecuritylicense.moxa.com/Account/Login

Workaround:

  • * Minimize network exposure to ensure the device is not accessible from the Internet. * When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). * The starting point of all the above vulnerabilities is from the web service, so it is suggested to disable web service temporarily if you completed configuration to prevent further damages from these vulnerabilities until installed patch or updated firmware.

Category

5.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.07%
Vendor Advisory moxa.com
Affected: Moxa MXsecurity Series
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-4740?
CVE-2024-4740 has been scored as a medium severity vulnerability.
How to fix CVE-2024-4740?
To fix CVE-2024-4740: Moxa has developed an appropriate solution to address the vulnerability. The solution for the affected product is shown below. * MXsecurity: Please upgrade to the firmware version 2.2.0 or higher via the Moxa Software Licensing Portal https://netsecuritylicense.moxa.com/Account/Login
Is CVE-2024-4740 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-4740 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-4740?
CVE-2024-4740 affects Moxa MXsecurity Series.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.