Mbconnectline

Mymbconnect24

38 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Veröffentlicht 24.06.2025 08:15:23
  • Zuletzt bearbeitet 26.06.2025 18:58:14

An unauthenticated remote attacker can obtain limited sensitive information and/or DoS the device due to missing authentication for critical function.

  • EPSS 0.05%
  • Veröffentlicht 24.06.2025 08:14:31
  • Zuletzt bearbeitet 26.06.2025 18:58:14

An unauthenticated remote attacker can enumerate valid user names from an unprotected endpoint.

  • EPSS 0.15%
  • Veröffentlicht 24.06.2025 08:10:29
  • Zuletzt bearbeitet 26.06.2025 18:58:14

An low privileged remote attacker in possession of the second factor for another user can login as that user without knowledge of the other user`s password.

  • EPSS 0.13%
  • Veröffentlicht 18.03.2025 11:15:39
  • Zuletzt bearbeitet 18.03.2025 11:15:39

An unauthenticated remote attacker can gain access to the cloud API due to a lack of authentication for a critical function in the affected devices. Availability is not affected.

  • EPSS 0.01%
  • Veröffentlicht 18.03.2025 11:03:35
  • Zuletzt bearbeitet 20.08.2025 06:15:31

A local user may find a configuration file on the client workstation with unencrypted sensitive data. This allows an attacker to impersonate the device or prevent the device from accessing the cloud portal which leads to a DoS.

  • EPSS 0.04%
  • Veröffentlicht 15.10.2024 11:15:11
  • Zuletzt bearbeitet 21.11.2024 09:37:35

An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.

  • EPSS 0.73%
  • Veröffentlicht 15.10.2024 11:15:11
  • Zuletzt bearbeitet 21.11.2024 09:37:35

An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.

  • EPSS 0.11%
  • Veröffentlicht 16.10.2023 09:15:11
  • Zuletzt bearbeitet 21.11.2024 08:36:04

In Red Lion Europe mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an improperly implemented access validation allows an authenticated, low privileged attacker to gain read access to limited, non-crit...

  • EPSS 0.06%
  • Veröffentlicht 06.06.2023 11:15:09
  • Zuletzt bearbeitet 21.11.2024 07:39:53

Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remote attacker with low privileges to view a l...

  • EPSS 0.02%
  • Veröffentlicht 06.06.2023 11:15:09
  • Zuletzt bearbeitet 21.11.2024 07:38:14

An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version <= 2.13.3. An authenticated remote user with low privileges can change the password of any user in the sa...