Article No° | Product Name | Affected Version(s) |
---|---|---|
mbNET.mini | <= 2.2.13 |
Multiple vulnerabilities have been discovered in MB connect line mbNET.mini product allowing for RCE or unauthorized file access.
An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.
The devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices.
An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
An unauthenticated remote attacker can get read access to files in the "/tmp" directory due to missing authentication.
CVE-2024-45271, CVE-2024-45274 and CVE-2024-45275 allow remote code execution with system privileges, resulting in full compromise of the device.
CVE-2024-45273 allows undetectable tampering and manipulation of encrypted configuration files.
CVE-2024-45276 allows unauthenticated access to potential sensitive files.
Remediation
Update mbNET.mini to version 2.3.1.
CERT@VDE coordinated with Red Lion Europe
Reported by Moritz Abrell of SySS GmbH