Summary
Two issues have been discovered in mymbCONNECT24 and mbCONNECT24 in all versionsincluding V2.8.0.
Updated affected versions (and solution) due to incomplete fixes in previous versions
Impact
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
mbCONNECT24 <=2.11.2 | mbCONNECT24 <=2.11.2 | |
mymbCONNECT24 <=2.11.2 | mymbCONNECT24 <=2.11.2 |
Vulnerabilities
Expand / Collapse allIn MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an unauthenticated user can enumerate valid users by checking what kind of response the server sends.
In MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server.
Remediation
CVE-2021-34575: Update to 2.9.0
CVE-2021-34574: Update to 2.12.1
Acknowledgments
MB connect line GmbH thanks the following parties for their efforts:
- CERT@VDE for coordination (see https://certvde.com )
- OTORIO for reporting
Revision History
Version | Date | Summary |
---|---|---|
1.0.0 | 09/07/2022 12:48 | Initial revision. |
1.1.0 | 09/07/2022 16:00 | Update A |
1.2.0 | 06/06/2025 09:00 | Fixed CVE-IDs in Solution/Remidiation |