Zurück zur Übersicht

MB connect line: two vulnerabilities in mymbCONNECT24, mbCONNECT24 (Update A)

VDE-2021-030
Last update
06.06.2025 09:00
Published at
07.09.2022 12:48
Vendor(s)
MB connect line GmbH
External ID
VDE-2021-030
CSAF Document

Summary

Two issues have been discovered in mymbCONNECT24 and mbCONNECT24 in all versionsincluding V2.8.0.

Updated affected versions (and solution) due to incomplete fixes in previous versions

Impact

Affected Product(s)

Model no. Product name Affected versions
mbCONNECT24 <=2.11.2 mbCONNECT24 <=2.11.2
mymbCONNECT24 <=2.11.2 mymbCONNECT24 <=2.11.2

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Observable Discrepancy (CWE-203)
Summary

In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an unauthenticated user can enumerate valid users by checking what kind of response the server sends.

References

Published
22.09.2025 14:57
Weakness
Incorrect Resource Transfer Between Spheres (CWE-669)
Summary

In MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server.

References

Remediation

CVE-2021-34575: Update to 2.9.0

CVE-2021-34574: Update to 2.12.1

Revision History

Version Date Summary
1.0.0 07.09.2022 12:48 Initial revision.
1.1.0 07.09.2022 16:00 Update A
1.2.0 06.06.2025 09:00 Fixed CVE-IDs in Solution/Remidiation