Mbconnectline

Mbconnect24

38 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Published 24.06.2025 08:15:23
  • Last modified 26.06.2025 18:58:14

An unauthenticated remote attacker can obtain limited sensitive information and/or DoS the device due to missing authentication for critical function.

  • EPSS 0.05%
  • Published 24.06.2025 08:14:31
  • Last modified 26.06.2025 18:58:14

An unauthenticated remote attacker can enumerate valid user names from an unprotected endpoint.

  • EPSS 0.15%
  • Published 24.06.2025 08:10:29
  • Last modified 26.06.2025 18:58:14

An low privileged remote attacker in possession of the second factor for another user can login as that user without knowledge of the other user`s password.

  • EPSS 0.13%
  • Published 18.03.2025 11:15:39
  • Last modified 18.03.2025 11:15:39

An unauthenticated remote attacker can gain access to the cloud API due to a lack of authentication for a critical function in the affected devices. Availability is not affected.

  • EPSS 0.01%
  • Published 18.03.2025 11:03:35
  • Last modified 20.08.2025 06:15:31

A local user may find a configuration file on the client workstation with unencrypted sensitive data. This allows an attacker to impersonate the device or prevent the device from accessing the cloud portal which leads to a DoS.

  • EPSS 0.04%
  • Published 15.10.2024 11:15:11
  • Last modified 21.11.2024 09:37:35

An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.

  • EPSS 0.73%
  • Published 15.10.2024 11:15:11
  • Last modified 21.11.2024 09:37:35

An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.

  • EPSS 0.11%
  • Published 16.10.2023 09:15:11
  • Last modified 21.11.2024 08:36:04

In Red Lion Europe mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an improperly implemented access validation allows an authenticated, low privileged attacker to gain read access to limited, non-crit...

  • EPSS 0.06%
  • Published 06.06.2023 11:15:09
  • Last modified 21.11.2024 07:39:53

Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remote attacker with low privileges to view a l...

  • EPSS 0.02%
  • Published 06.06.2023 11:15:09
  • Last modified 21.11.2024 07:38:14

An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version <= 2.13.3. An authenticated remote user with low privileges can change the password of any user in the sa...