Zurück zur Übersicht

MB connect line: Multiple vulnerabilites in mymbCONNECT24 and mbCONNECT24 (Update A)

VDE-2021-003
Last update
07.09.2022 12:46
Published at
07.09.2022 12:46
Vendor(s)
MB connect line GmbH
External ID
VDE-2021-003
CSAF Document

Summary

Multiple vulnerabilities have been found in mymbCONNECT24 and mbCONNECT24.
Update A, 2022-09-07:

Affected Products: updated affected versions due to incomplete fixes of some CVEs. See Solution for details.
Solution: updated version information.
Solution: Added Fix for CVE-2020-35561.
Solution: Added MFA remark for CVE-2020-35565.

Impact

please see cve id entries

Affected Product(s)

Model no. Product name Affected versions
mbCONNECT24 <= 2.11.2 mbCONNECT24 <= 2.11.2
mymbCONNECT24 <= 2.11.2 mymbCONNECT24 <= 2.11.2

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Improper Restriction of Excessive Authentication Attempts (CWE-307)
Summary

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. The login pages bruteforce detection is disabled by default.

References

Published
22.09.2025 14:57
Weakness
Use of Hard-coded Credentials (CWE-798)
Summary

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. The software uses a secure password for database access, but this password is shared across instances.

References

Published
22.09.2025 14:57
Weakness
Improper Privilege Management (CWE-269)
Summary

An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.6.1. There is a local privilege escalation from the www-data account to the root account.

References

Published
22.09.2025 14:57
Weakness
Improper Privilege Management (CWE-269)
Summary

An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. Improper use of access validation allows a logged in user to kill web2go sessions in the account he should not have access to.

References

Published
22.09.2025 14:57
Weakness
Server-Side Request Forgery (SSRF) (CWE-918)
Summary

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual through 2.11.2. There is an SSRF in the in the MySQL access check, allowing an attacker to scan for open ports and gain some information about possible credentials.

References

Published
22.09.2025 14:57
Weakness
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CWE-74)
Summary

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an outdated and unused component allowing for malicious user input of active code.

References

Published
22.09.2025 14:57
Weakness
Improper Privilege Management (CWE-269)
Summary

An issue in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 allows a logged in user to see devices in the account he should not have access to due to improper use of access validation.

References

Published
22.09.2025 14:57
Weakness
Improper Privilege Management (CWE-269)
Summary

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. Improper access validation allows a logged in user to shutdown or reboot devices in his account without having corresponding permissions.

References

Published
22.09.2025 14:57
Weakness
URL Redirection to Untrusted Site ('Open Redirect') (CWE-601)
Summary

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an unauthenticated open redirect in the redirect.php.

References

Published
22.09.2025 14:57
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is a self XSS issue with a crafted cookie in the login page.

References

Published
22.09.2025 14:57
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. There is an XSS issue in the redirect.php allowing an attacker to inject code via a get parameter.

References

Published
22.09.2025 14:57
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an incomplete XSS filter allowing an attacker to inject crafted malicious code into the page.

References

Published
22.09.2025 14:57
Weakness
Direct Request ('Forced Browsing') (CWE-425)
Summary

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual through 2.11.2. An unauthenticated attacker is able to access files (that should have been restricted) via forceful browsing.

References

Published
22.09.2025 14:57
Weakness
Use of Incorrectly-Resolved Name or Reference (CWE-706)
Summary

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. An attacker can read arbitrary JSON files via Local File Inclusion.

References

Published
22.09.2025 14:57
Weakness
Server-Side Request Forgery (SSRF) (CWE-918)
Summary

An issue was discovered MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. There is an SSRF in the HA module allowing an unauthenticated attacker to scan for open ports.

References

Published
22.09.2025 14:57
Weakness
Server-Side Request Forgery (SSRF) (CWE-918)
Summary

An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2 There is a SSRF in the LDAP access check, allowing an attacker to scan for open ports.

References

Published
22.09.2025 14:57
Weakness
Uncontrolled Resource Consumption (CWE-400)
Summary

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an unused function that allows an authenticated attacker to use up all available IPs of an account and thus not allow creation of new devices and users.

References

Published
22.09.2025 14:57
Weakness
Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. An incomplete filter applied to a database response allows an authenticated attacker to gain non-public information about other users and devices in the account.

References

Remediation

CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,
CVE-2020-12530, CVE-2020-35563, CVE-2020-35564,
CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1

CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.
Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2

CVE-2020-35567: None
Note: A proper fix for the underlying issue will come with a future architectural core-system-update.

CVE-2020-35565: None
Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin
Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.

CVE-2020-35561: Update to version 2.12.1

Update A, 2022-09-07:

CVE-2020-35557, CVE-2020-35570, CVE-2020-35558,
CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

Revision History

Version Date Summary
1 07.09.2022 12:46 Initial revision.