CVE-2023-39980 – MXsecurity Authenticated Information Disclosure Due to SQL Injection
https://notcve.org/view.php?id=CVE-2023-39980
A vulnerability that allows the unauthorized disclosure of authenticated information has been identified in MXsecurity versions prior to v1.0.1. This vulnerability arises when special elements are not neutralized correctly, allowing remote attackers to alter SQL commands. Se ha identificado una vulnerabilidad que permite la divulgación no autorizada de información autenticada en versiones de MXsecurity anteriores a la v1.0.1. Esta vulnerabilidad surge cuando los elementos especiales no se neutralizan correctamente, lo que permite a atacantes remotos alterar comandos SQL. • https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2023-39979 – MXsecurity Authentication Bypass
https://notcve.org/view.php?id=CVE-2023-39979
There is a vulnerability in MXsecurity versions prior to 1.0.1 that can be exploited to bypass authentication. A remote attacker might access the system if the web service authenticator has insufficient random values. Hay una vulnerabilidad en las versiones anteriores a 1.0.1 de MXsecurity que puede aprovecharse para omitir la autenticación. Un atacante remoto podría acceder al sistema si la autenticación del servicio web tiene valores aleatorios insuficientes • https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities • CWE-330: Use of Insufficiently Random Values CWE-334: Small Space of Random Values •
CVE-2023-33236 – MXsecurity Hardcoded Credential Vulnerability
https://notcve.org/view.php?id=CVE-2023-33236
MXsecurity version 1.0 is vulnearble to hardcoded credential vulnerability. This vulnerability has been reported that can be exploited to craft arbitrary JWT tokens and subsequently bypass authentication for web-based APIs. This vulnerability allows remote attackers to bypass authentication on affected installations of Moxa MXsecurity Series appliances. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the web-based interface. The issue results from a hardcoded JWT secret within the application configuration. • https://www.moxa.com/en/support/product-support/security-advisory/mxsecurity-command-injection-and-hardcoded-credential-vulnerabilities • CWE-798: Use of Hard-coded Credentials •
CVE-2023-33235 – MXsecurity Command Injection Vulnerability
https://notcve.org/view.php?id=CVE-2023-33235
MXsecurity version 1.0 is vulnearble to command injection vulnerability. This vulnerability has been reported in the SSH CLI program, which can be exploited by attackers who have gained authorization privileges. The attackers can break out of the restricted shell and subsequently execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Moxa MXsecurity Series appliances. Authentication is required to exploit this vulnerability. The specific flaw exists within the SSH CLI program. • https://www.moxa.com/en/support/product-support/security-advisory/mxsecurity-command-injection-and-hardcoded-credential-vulnerabilities • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •