VDE-2024-042
Last update
08/17/2023 14:00
Published at
08/17/2023 14:00
Vendor(s)
MB connect line GmbH
External ID
VDE-2024-042
CSAF Document
Summary
Several Red Lion Europe products are vulnerable to a possible race condition vulnerability in OpenSSH named "regreSSHion".
Impact
Possible full system compromise where an attacker can execute arbitrary code with the highest privileges.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
mbCONNECT24 <2.16.1 | mbCONNECT24 <2.16.1 | |
mbNET 8.0.0<8.2.0 | mbNET 8.0.0<8.2.0 | |
mbNET.rokey 8.0.0<8.2.0 | mbNET.rokey 8.0.0<8.2.0 | |
mymbCONNECT24 <2.16.1 | mymbCONNECT24 <2.16.1 | |
mbCONNECT24 <2.16.1 | mbCONNECT24 <2.16.1 | |
mbNET 8.0.0<8.2.0 | mbNET 8.0.0<8.2.0 | |
mbNET.rokey 8.0.0<8.2.0 | mbNET.rokey 8.0.0<8.2.0 | |
mymbCONNECT24 <2.16.1 | mymbCONNECT24 <2.16.1 |
Vulnerabilities
Expand / Collapse all
Published
09/22/2025 14:57
Severity
Weakness
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (CWE-362)
Summary
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
References
Mitigation
Prevent all access to the sshd daemon listening on port 22.
Remediation
Update to latest firmware:
2.16.1 for mbCONNECT24/mymbCONNECT24
8.2.0 for mbNET/mbNET.rokey
Revision History
Version | Date | Summary |
---|---|---|
1.0.0 | 08/17/2023 14:00 | Initial revision. |