![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-45273 – MB connect line/Helmholz: Weak encryption of configuration file
https://notcve.org/view.php?id=CVE-2024-45273
15 Oct 2024 — An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used. Un atacante local no autenticado puede descifrar el archivo de configuración del dispositivo y, por lo tanto, comprometer el dispositivo debido a una implementación débil del cifrado utilizado. • https://cert.vde.com/en/advisories/VDE-2024-056 • CWE-261: Weak Encoding for Password •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-45272 – MB connect line/Helmholz: Generation of weak passwords vulnerability
https://notcve.org/view.php?id=CVE-2024-45272
15 Oct 2024 — An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost. Un atacante remoto no autenticado puede realizar un ataque de fuerza bruta a las credenciales del portal de servicio remoto con una alta probabilidad de éxito, lo que da como resultado la pérdida de la conexión. • https://cert.vde.com/en/advisories/VDE-2024-068 • CWE-1391: Use of Weak Credentials •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-4834
https://notcve.org/view.php?id=CVE-2023-4834
16 Oct 2023 — In Red Lion Europe mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an improperly implemented access validation allows an authenticated, low privileged attacker to gain read access to limited, non-critical device information in his account he should not have access to. En Red Lion Europe mbCONNECT24 y mymbCONNECT24 y Helmholz myREX24 y myREX24.virtual hasta la versión 2.14.2 incluida, una validación de acceso implementada incorrectamente permite a un atacante... • https://cert.vde.com/en/advisories/VDE-2023-041 • CWE-269: Improper Privilege Management •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-1779 – Helmholz and MB Connect Line: Account takeover via password reset in multiple products
https://notcve.org/view.php?id=CVE-2023-1779
06 Jun 2023 — Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remote attacker with low privileges to view a limited amount of another accounts contact information. Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remo... • https://cert.vde.com/en/advisories/VDE-2023-008 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-863: Incorrect Authorization •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-0985 – Helmholz and MB Connect Line: Account takeover via password reset in multiple products
https://notcve.org/view.php?id=CVE-2023-0985
06 Jun 2023 — An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version <= 2.13.3. An authenticated remote user with low privileges can change the password of any user in the same account. This allows to take over the admin user and therefore fully compromise the account. An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version <= 2.13.3. An authent... • https://cert.vde.com/en/advisories/VDE-2023-002 • CWE-639: Authorization Bypass Through User-Controlled Key •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-22520 – User enumeration vulnerability in MB connect line and Helmholz products
https://notcve.org/view.php?id=CVE-2022-22520
14 Sep 2022 — A remote, unauthenticated attacker can enumerate valid users by sending specific requests to the webservice of MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. Un atacante remoto no autenticado puede enumerar usuarios válidos mediante el envío de peticiones específicas al webservice de la línea de conexión MB mymbCONNECT24, mbCONNECT24 y Helmholz myREX24 y myREX24.virtual en todas las versiones hasta v2.11.2 • https://cert.vde.com/en/advisories/VDE-2022-011 • CWE-204: Observable Response Discrepancy •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-34580 – Remote user enumeration in mymbCONNECT24, mbCONNECT24 <= 2.9.0
https://notcve.org/view.php?id=CVE-2021-34580
27 Oct 2021 — In mymbCONNECT24, mbCONNECT24 <= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts. En mymbCONNECT24, mbCONNECT24 versiones anteriores a 2.9.0 incluyéndola, un usuario no autenticado puede enumerar los usuarios válidos del backend al comprobar qué tipo de respuesta envía el servidor para los intentos de inicio de sesión no válidos diseñados • https://cert.vde.com/en/advisories/VDE-2021-037 • CWE-203: Observable Discrepancy CWE-204: Observable Response Discrepancy •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-34575 – Information Exposure in mymbCONNECT24, mbCONNECT24 <= 2.8.0
https://notcve.org/view.php?id=CVE-2021-34575
02 Aug 2021 — In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an unauthenticated user can enumerate valid users by checking what kind of response the server sends. En MB connect line mymbCONNECT24, mbCONNECT24 versiones anteriores a 2.8.0 incluyéndolas, un usuario no autenticado puede enumerar usuarios válidos al comprobar qué tipo de respuesta envía el servidor • https://cert.vde.com/de-de/advisories/vde-2021-030 • CWE-203: Observable Discrepancy •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-34574 – Password policy evasion in products of MB connect line and Helmholz
https://notcve.org/view.php?id=CVE-2021-34574
02 Aug 2021 — In MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server. En MB connect line mymbCONNECT24, mbCONNECT24 y Helmholz myREX24 y myREX24.virtual en todas las versiones hasta la v2.11.2 un atacante autenticado puede cambiar la contraseña de su cuenta por una nueva qu... • https://cert.vde.com/en/advisories/VDE-2021-030 • CWE-669: Incorrect Resource Transfer Between Spheres •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-12530
https://notcve.org/view.php?id=CVE-2020-12530
02 Mar 2021 — An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. There is an XSS issue in the redirect.php allowing an attacker to inject code via a get parameter. Se detectó un problema en el software MB connect line mymbCONNECT24 y mbCONNECT24, en todas las versiones hasta la V2.6.2. Se presenta un problema de tipo XSS en el archivo redirect.php que permite a un atacante inyectar código por medio de un parámetro get • https://cert.vde.com/de-de/advisories/vde-2021-003 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •