7.5
CVE-2025-3091
- EPSS 0.15%
- Published 24.06.2025 08:10:29
- Last modified 26.06.2025 18:58:14
- Source info@cert.vde.com
- Teams watchlist Login
- Open Login
An low privileged remote attacker in possession of the second factor for another user can login as that user without knowledge of the other user`s password.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorMB connect line
≫
Product
mbCONNECT24
Default Statusunaffected
Version <
2.16.5
Version
0
Status
affected
VendorMB connect line
≫
Product
mymbCONNECT24
Default Statusunaffected
Version <
2.18.0
Version
0
Status
affected
VendorMB connect line
≫
Product
mymbCONNECT24
Default Statusunaffected
Version <
2.18.0
Version
0
Status
affected
VendorMB connect line
≫
Product
mymbCONNECT24
Default Statusunaffected
Version <
2.16.5
Version
0
Status
affected
VendorHelmholz
≫
Product
myREX24
Default Statusunaffected
Version <
2.18.0
Version
0
Status
affected
VendorHelmholz
≫
Product
myREX24
Default Statusunaffected
Version <
2.16.5
Version
0
Status
affected
VendorHelmholz
≫
Product
myREX24.virtual
Default Statusunaffected
Version <
2.18.0
Version
0
Status
affected
VendorHelmholz
≫
Product
myREX24.virtual
Default Statusunaffected
Version <
2.16.5
Version
0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
| Type | Source | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.15% | 0.367 |
| Source | Base Score | Exploit Score | Impact Score | Vector string |
|---|---|---|---|---|
| info@cert.vde.com | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.