The lack of access restriction to a resource from unauthorized users makes MXsecurity software versions v1.1.0 and prior vulnerable. By acquiring a valid authenticator, an attacker can pose as an authorized user and successfully access the resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mxsecurity | Moxa | * | 1.1.0 (including) |