The affected products and firmware versions are shown below.
||Software Package Version 3.x to 3.2.2.
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.
- Please upgrade to software package version 3.2.4 or higher. (Download Link)
- To keep the environment secure, please change your Windows password regularly and use a firewall.
- If users need to use the multiple-site function, we suggest using the firewall to block Port 8883. If users do not have this requirement, we suggest using the firewall to assign the Accessible IP of MXview at the client site.
We would like to express our appreciation to Noam Moshe from Claroty for reporting the vulnerability, working with us to help enhance the security of our products, and helping us provide a better service to our customers.
||Sep 17, 2021