
CVE-2024-23943 – MB connect line: Cloud API access due to a lack of authentication for a critical function
https://notcve.org/view.php?id=CVE-2024-23943
18 Mar 2025 — An unauthenticated remote attacker can gain access to the cloud API due to a lack of authentication for a critical function in the affected devices. Availability is not affected. • https://cert.vde.com/en/advisories/VDE-2024-010 • CWE-306: Missing Authentication for Critical Function •

CVE-2024-23942 – MB connect line: Configuration File on the client workstation is not encrypted
https://notcve.org/view.php?id=CVE-2024-23942
18 Mar 2025 — A local user may find a configuration file on the client workstation with unencrypted sensitive data. This allows an attacker to impersonate the device or prevent the device from accessing the cloud portal which leads to a DoS. • https://cert.vde.com/en/advisories/VDE-2024-010 • CWE-311: Missing Encryption of Sensitive Data •

CVE-2024-45276 – MB connect line/Helmholz: tmp directory exposed via webservice
https://notcve.org/view.php?id=CVE-2024-45276
15 Oct 2024 — An unauthenticated remote attacker can get read access to files in the "/tmp" directory due to missing authentication. Un atacante remoto no autenticado puede obtener acceso de lectura a los archivos en el directorio "/tmp" debido a la falta de autenticación. • https://cert.vde.com/en/advisories/VDE-2024-056 • CWE-306: Missing Authentication for Critical Function CWE-552: Files or Directories Accessible to External Parties •

CVE-2024-45275 – MB connect line/Helmholz: Hardcoded user accounts with hard-coded passwords
https://notcve.org/view.php?id=CVE-2024-45275
15 Oct 2024 — The devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices. Los dispositivos contienen dos cuentas de usuario codificadas con contraseñas codificadas que permiten a un atacante remoto no autenticado tener control total de los dispositivos afectados. • https://cert.vde.com/en/advisories/VDE-2024-056 • CWE-798: Use of Hard-coded Credentials •

CVE-2024-45274 – MB connect line/Helmholz: Remote code execution via confnet service
https://notcve.org/view.php?id=CVE-2024-45274
15 Oct 2024 — An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication. Un atacante remoto no autenticado puede ejecutar comandos del sistema operativo a través de UDP en el dispositivo debido a la falta de autenticación. • https://cert.vde.com/en/advisories/VDE-2024-056 • CWE-306: Missing Authentication for Critical Function •

CVE-2024-45273 – MB connect line/Helmholz: Weak encryption of configuration file
https://notcve.org/view.php?id=CVE-2024-45273
15 Oct 2024 — An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used. Un atacante local no autenticado puede descifrar el archivo de configuración del dispositivo y, por lo tanto, comprometer el dispositivo debido a una implementación débil del cifrado utilizado. • https://cert.vde.com/en/advisories/VDE-2024-056 • CWE-261: Weak Encoding for Password •

CVE-2024-45271 – MB connect line/Helmholz: Remote code execution due to improper input validation
https://notcve.org/view.php?id=CVE-2024-45271
15 Oct 2024 — An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation. Un atacante local no autenticado puede obtener privilegios de administrador al implementar un archivo de configuración debido a una validación de entrada incorrecta. • https://cert.vde.com/en/advisories/VDE-2024-056 • CWE-20: Improper Input Validation CWE-116: Improper Encoding or Escaping of Output •