The affected products and firmware versions are shown below.
CVE-2021-40390: Software Version 3.2.0 to 3.2.4.
CVE-2021-40392: Software Version 3.2.4 or lower.
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.
For item 1: Please upgrade to software version 3.2.6 or higher. (Download Link)
For item 2: Users can manually check the "Disable HTTP Port" feature when installing or starting the MXview Server to mitigate this risk.
Please follow the steps below to upgrade your version of MXview:
- Back up the current MXview database.
- Stop the MXview Service.
- Download the latest version of MXview.
- Run the installer with the latest version of MXview.
We would like to express our appreciation to Patrick DeSantis of Cisco Talos for reporting the vulnerability, working with us to help enhance the security of our products, and helping us provide a better service to our customers.
||Feb 11, 2022
||Added Upgrade Process
||Feb 14, 2022
||CVE-2021-40390 Affected Versions 3.2.4 or lower changed to 3.2.0 to 3.2.4
||Mar 17, 2022