The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused due to sensitive information exposure.
Solution:
Workaround:
The product stores sensitive information in cleartext in a file, or on disk.
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Link | Tags |
---|---|
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series | patch vendor advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-05 | third party advisory us government resource |