Moxa has a new version to mitigate an information exposure vulnerability in its MXview, according to a report with ICS-CERT.
Successful exploitation of this vulnerability, discovered by Michael DePlante of Leahy Center for Digital Investigation at Champlain College, could allow a remote attacker to access and read cryptographic private keys.
A network management software, MXview versions 2.8 and prior suffer from the remotely exploitable vulnerability.
The private key of the web server is able to be read and accessed via an HTTP GET request, which may allow a remote attacker to decrypt encrypted information.
CVE-2018-7506 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.5.
The product sees use mainly in the critical manufacturing, energy, and transportation systems sectors. It also sees action on a global basis.
No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.
Taiwan-based Moxa developed a new version of MXview to mitigate the vulnerability. MXview versions 2.9 can be downloaded from the Moxa Support Website.