Article No° | Product Name | Affected Version(s) |
---|---|---|
mbCONNECT24 | <= 2.16.2 | |
mbNET HW1 | <= 5.1.11 | |
mbNET/mbNET.rokey | <= 8.2.0 | |
mbSPIDER | <= 2.6.5 | |
mymbCONNECT24 | <= 2.16.2 |
Multiple vulnerabilities have been discovered in MB connect line products that could allow RCE or unauthorized file access. CVE-2024-45272 affects the mbCONNECT24 and mymbCONNECT24 products, while CVE-2024-45273 affects the mbNET/mbNET.rokey, mbCONNECT24, mymbCONNECT24, mbNET HW1, and mbSPIDER products.
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.
CVE-2024-45272 allows brute-force attacks against remote credentials with a high probability of success.
CVE-2024-45273 allows undetectable tampering and manipulation of encrypted configuration files.
Remediation
Note: mbNET HW1 and mbSPIDER are EOL and will not receive any further updates.
CERT@VDE coordinated with Red Lion Europe
Reported by Moritz Abrell of SySS GmbH