Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Mbconnect24
(Mbconnectline)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 33 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-06-06 | CVE-2023-0985 | An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version <= 2.13.3. An authenticated remote user with low privileges can change the password of any user in the same account. This allows to take over the admin user and therefore fully compromise the account. | Mbconnect24, Mymbconnect24 | N/A | ||
2023-06-06 | CVE-2023-1779 | Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remote attacker with low privileges to view a limited amount of another accounts contact information. | Mbconnect24, Mymbconnect24 | N/A | ||
2023-10-16 | CVE-2023-4834 | In Red Lion Europe mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an improperly implemented access validation allows an authenticated, low privileged attacker to gain read access to limited, non-critical device information in his account he should not have access to. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | N/A | ||
2024-10-15 | CVE-2024-45272 | An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost. | Myrex24_v2_virtual_server, Rex_200_firmware, Rex_250_firmware, Rex_300_firmware, Mbconnect24, Mbnet\.rokey_firmware, Mbnet_firmware, Mbnet_hw1_firmware, Mbspider_mdh_905_firmware, Mbspider_mdh_906_firmware, Mbspider_mdh_915_firmware, Mbspider_mdh_916_firmware, Mymbconnect24 | N/A | ||
2024-10-15 | CVE-2024-45273 | An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used. | Myrex24_v2_virtual_server, Rex_100_firmware, Rex_200_firmware, Rex_250_firmware, Rex_300_firmware, Mbconnect24, Mbnet\.mini_firmware, Mbnet\.rokey_firmware, Mbnet_firmware, Mbnet_hw1_firmware, Mbspider_mdh_905_firmware, Mbspider_mdh_906_firmware, Mbspider_mdh_915_firmware, Mbspider_mdh_916_firmware, Mymbconnect24 | 7.8 | ||
2021-03-02 | CVE-2020-12527 | An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. Improper access validation allows a logged in user to shutdown or reboot devices in his account without having corresponding permissions. | Myrex24, Myrex24\.virtual, Mbconnect24, Mymbconnect24 | 6.5 | ||
2020-04-14 | CVE-2020-10382 | An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an authenticated remote code execution in the backup-scheduler. | Mbconnect24, Mymbconnect24 | 8.8 | ||
2020-04-14 | CVE-2020-10383 | An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated remote code execution in the com_mb24sysapi module. | Mbconnect24, Mymbconnect24 | 9.8 | ||
2020-04-14 | CVE-2020-10381 | An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated SQL injection in DATA24, allowing attackers to discover database and table names. | Mbconnect24, Mymbconnect24 | 5.3 | ||
2021-03-02 | CVE-2020-12530 | An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. There is an XSS issue in the redirect.php allowing an attacker to inject code via a get parameter. | Mbconnect24, Mymbconnect24 | 6.1 |