Article No° | Product Name | Affected Version(s) |
---|---|---|
mbCONNECT24 | <= 2.11.2 | |
mymbCONNECT24 | <= 2.11.2 |
Multiple vulnerabilities have been found in mymbCONNECT24 and mbCONNECT24.
Update A, 2022-09-07:
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. The login pages bruteforce detection is disabled by default.
An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.6.1. There is a local privilege escalation from the www-data account to the root account.
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. The software uses a secure password for database access, but this password is shared across instances.
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an outdated and unused component allowing for malicious user input of active code.
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is a self XSS issue with a crafted cookie in the login page.
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an unauthenticated open redirect in the redirect.php.
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an incomplete XSS filter allowing an attacker to inject crafted malicious code into the page.
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an unused function that allows an authenticated attacker to use up all available IPs of an account and thus not allow creation of new devices and users.
please see cve id entries
CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,
CVE-2020-12530, CVE-2020-35563, CVE-2020-35564,
CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1
CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.
Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2
CVE-2020-35567: None
Note: A proper fix for the underlying issue will come with a future architectural core-system-update.
CVE-2020-35565: None
Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin
Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.
CVE-2020-35561: Update to version 2.12.1
Update A, 2022-09-07:
CVE-2020-35557, CVE-2020-35570, CVE-2020-35558,
CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1
OTORIO reported the vulnerabilities to MB connect line.
CERT@VDE coordinated.