Back to overview

MB connect line: Privilege escalation in mbDIALUP

VDE-2021-017
Last update
05/14/2025 14:28
Published at
07/22/2021 13:35
Vendor(s)
MB connect line GmbH
External ID
VDE-2021-017
CSAF Document

Summary

Multiple Vulnerabilities in mbConnect24serv (a software service of mbDIALUP) can lead to arbitrary code execution due to improper privilege management.

Update A, 2021-11-24

corrected fixed version in solution from 3.9R0.4 to 3.9R0.5

Update B, 2022-03-28

Updated CVSS score from CVE-2021-33527 from 7.8 to 9.8 due to new information about the vulnerability

Impact

Please consult the CVE entries.

Affected Product(s)

Model no. Product name Affected versions
mbDIALUP <=3.9R0.0 mbDIALUP <=3.9R0.0

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:58
Weakness
Improper Input Validation (CWE-20)
Summary

In MB connect line mbDIALUP versions <=3.9R0.0 a remote attacker can send a specifically crafted HTTP request to the service running with NT AUTHORITY\SYSTEM that will not correctly validate the input. This can lead to an arbitrary code execution with the privileges of the service.

References

Published
09/22/2025 14:58
Weakness
Improper Privilege Management (CWE-269)
Summary

In MB connect line mbDIALUP versions <=3.9R0.0 a low privileged local attacker can send a command to the service running with NT AUTHORITY\SYSTEM instructing it to execute a malicous OpenVPN configuration resulting in arbitrary code execution with the privileges of the service.

References

Remediation

Update to 3.9R0.5

Revision History

Version Date Summary
1 07/22/2021 13:35 Initial revision.
2 11/24/2021 12:00 Update A
3 03/28/2022 12:00 Update B
4 05/14/2025 14:28 Fix: version space, added distribution