38 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

24 Jun 2025 — An unauthenticated remote attacker can enumerate valid user names from an unprotected endpoint. • https://certvde.com/en/advisories/VDE-2025-035 • CWE-204: Observable Response Discrepancy •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

24 Jun 2025 — An low privileged remote attacker in possession of the second factor for another user can login as that user without knowledge of the other user`s password. • https://certvde.com/en/advisories/VDE-2025-035 • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 8.5EPSS: 0%CPEs: 4EXPL: 0

24 Jun 2025 — An unauthenticated remote attacker can obtain limited sensitive information and/or DoS the device due to missing authentication for critical function. • https://certvde.com/en/advisories/VDE-2025-034 • CWE-306: Missing Authentication for Critical Function •

CVSS: 9.1EPSS: 0%CPEs: 4EXPL: 0

18 Mar 2025 — An unauthenticated remote attacker can gain access to the cloud API due to a lack of authentication for a critical function in the affected devices. Availability is not affected. • https://cert.vde.com/en/advisories/VDE-2024-010 • CWE-306: Missing Authentication for Critical Function •

CVSS: 7.1EPSS: 0%CPEs: 4EXPL: 0

18 Mar 2025 — A local user may find a configuration file on the client workstation with unencrypted sensitive data. This allows an attacker to impersonate the device or prevent the device from accessing the cloud portal which leads to a DoS. • https://cert.vde.com/en/advisories/VDE-2024-010 • CWE-311: Missing Encryption of Sensitive Data •

CVSS: 8.4EPSS: 0%CPEs: 11EXPL: 0

15 Oct 2024 — An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used. Un atacante local no autenticado puede descifrar el archivo de configuración del dispositivo y, por lo tanto, comprometer el dispositivo debido a una implementación débil del cifrado utilizado. • https://cert.vde.com/en/advisories/VDE-2024-056 • CWE-261: Weak Encoding for Password •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

15 Oct 2024 — An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost. Un atacante remoto no autenticado puede realizar un ataque de fuerza bruta a las credenciales del portal de servicio remoto con una alta probabilidad de éxito, lo que da como resultado la pérdida de la conexión. • https://cert.vde.com/en/advisories/VDE-2024-068 • CWE-1391: Use of Weak Credentials •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

16 Oct 2023 — In Red Lion Europe mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an improperly implemented access validation allows an authenticated, low privileged attacker to gain read access to limited, non-critical device information in his account he should not have access to. En Red Lion Europe mbCONNECT24 y mymbCONNECT24 y Helmholz myREX24 y myREX24.virtual hasta la versión 2.14.2 incluida, una validación de acceso implementada incorrectamente permite a un atacante... • https://cert.vde.com/en/advisories/VDE-2023-041 • CWE-269: Improper Privilege Management •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

06 Jun 2023 — Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remote attacker with low privileges to view a limited amount of another accounts contact information. Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remo... • https://cert.vde.com/en/advisories/VDE-2023-008 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-863: Incorrect Authorization •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

06 Jun 2023 — An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version <= 2.13.3. An authenticated remote user with low privileges can change the password of any user in the same account. This allows to take over the admin user and therefore fully compromise the account. An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version <= 2.13.3. An authent... • https://cert.vde.com/en/advisories/VDE-2023-002 • CWE-639: Authorization Bypass Through User-Controlled Key •