CVE-2024-45272

An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.
Configurations

Configuration 1 (hide)

cpe:2.3:a:helmholz:myrex24_v2_virtual_server:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:helmholz:rex_300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_300:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:helmholz:rex_200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_200:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:helmholz:rex_250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_250:-:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*
cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:mbconnectline:mbspider_mdh_905_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_905:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:mbconnectline:mbspider_mdh_915_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_915:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:mbconnectline:mbspider_mdh_906_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_906:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:mbconnectline:mbspider_mdh_916_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_916:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:mbconnectline:mbnet_hw1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet_hw1:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:mbconnectline:mbnet_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:mbconnectline:mbnet.rokey_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet.rokey:-:*:*:*:*:*:*:*

History

21 Nov 2024, 09:37

Type Values Removed Values Added
References
  • () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-061.txt -

17 Oct 2024, 17:42

Type Values Removed Values Added
CPE cpe:2.3:o:mbconnectline:mbspider_mdh_916_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbnet.rokey_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbspider_mdh_915_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:helmholz:myrex24_v2_virtual_server:*:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbnet_hw1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbspider_mdh_906_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet:-:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_915:-:*:*:*:*:*:*:*
cpe:2.3:o:helmholz:rex_250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_905:-:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet.rokey:-:*:*:*:*:*:*:*
cpe:2.3:o:helmholz:rex_200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:helmholz:rex_300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_250:-:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_200:-:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_906:-:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbspider_mdh_905_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet_hw1:-:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_916:-:*:*:*:*:*:*:*
cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_300:-:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbnet_firmware:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other
References () https://cert.vde.com/en/advisories/VDE-2024-068 - () https://cert.vde.com/en/advisories/VDE-2024-068 - Third Party Advisory
References () https://cert.vde.com/en/advisories/VDE-2024-069 - () https://cert.vde.com/en/advisories/VDE-2024-069 - Third Party Advisory
Summary
  • (es) Un atacante remoto no autenticado puede realizar un ataque de fuerza bruta a las credenciales del portal de servicio remoto con una alta probabilidad de éxito, lo que da como resultado la pérdida de la conexión.
First Time Mbconnectline mbspider Mdh 905 Firmware
Mbconnectline mbspider Mdh 905
Mbconnectline mbnet Hw1
Mbconnectline mbspider Mdh 915
Mbconnectline mbspider Mdh 906
Helmholz rex 200 Firmware
Helmholz rex 250
Mbconnectline mbnet.rokey Firmware
Mbconnectline mbnet
Helmholz myrex24 V2 Virtual Server
Helmholz rex 300 Firmware
Mbconnectline mbspider Mdh 916 Firmware
Mbconnectline
Mbconnectline mbnet.rokey
Helmholz
Mbconnectline mbnet Firmware
Mbconnectline mbspider Mdh 915 Firmware
Mbconnectline mymbconnect24
Mbconnectline mbconnect24
Helmholz rex 250 Firmware
Mbconnectline mbspider Mdh 906 Firmware
Mbconnectline mbnet Hw1 Firmware
Helmholz rex 300
Mbconnectline mbspider Mdh 916
Helmholz rex 200

15 Oct 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-15 11:15

Updated : 2024-11-21 09:37


NVD link : CVE-2024-45272

Mitre link : CVE-2024-45272

CVE.ORG link : CVE-2024-45272


JSON object : View

Products Affected

mbconnectline

  • mbconnect24
  • mbspider_mdh_905
  • mbnet.rokey
  • mbspider_mdh_905_firmware
  • mbspider_mdh_906_firmware
  • mbnet_firmware
  • mbnet
  • mbnet.rokey_firmware
  • mbnet_hw1_firmware
  • mbspider_mdh_915
  • mbnet_hw1
  • mbspider_mdh_906
  • mbspider_mdh_915_firmware
  • mbspider_mdh_916
  • mymbconnect24
  • mbspider_mdh_916_firmware

helmholz

  • rex_300_firmware
  • rex_300
  • rex_200
  • myrex24_v2_virtual_server
  • rex_250
  • rex_250_firmware
  • rex_200_firmware
CWE
CWE-1391

Use of Weak Credentials

NVD-CWE-Other