An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.
References
Link | Resource |
---|---|
https://cert.vde.com/en/advisories/VDE-2024-068 | Third Party Advisory |
https://cert.vde.com/en/advisories/VDE-2024-069 | Third Party Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-061.txt |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
History
21 Nov 2024, 09:37
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Oct 2024, 17:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert.vde.com/en/advisories/VDE-2024-068 - Third Party Advisory | |
References | () https://cert.vde.com/en/advisories/VDE-2024-069 - Third Party Advisory | |
CPE | cpe:2.3:h:mbconnectline:mbnet.rokey:-:*:*:*:*:*:*:* cpe:2.3:o:mbconnectline:mbspider_mdh_906_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:* cpe:2.3:a:helmholz:myrex24_v2_virtual_server:*:*:*:*:*:*:*:* cpe:2.3:h:mbconnectline:mbnet_hw1:-:*:*:*:*:*:*:* cpe:2.3:o:mbconnectline:mbspider_mdh_915_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mbconnectline:mbspider_mdh_915:-:*:*:*:*:*:*:* cpe:2.3:o:helmholz:rex_250_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mbconnectline:mbnet_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mbconnectline:mbspider_mdh_916:-:*:*:*:*:*:*:* cpe:2.3:h:helmholz:rex_200:-:*:*:*:*:*:*:* cpe:2.3:h:mbconnectline:mbspider_mdh_906:-:*:*:*:*:*:*:* cpe:2.3:o:mbconnectline:mbspider_mdh_916_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mbconnectline:mbspider_mdh_905:-:*:*:*:*:*:*:* cpe:2.3:o:helmholz:rex_200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:helmholz:rex_300_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:helmholz:rex_250:-:*:*:*:*:*:*:* cpe:2.3:h:mbconnectline:mbnet:-:*:*:*:*:*:*:* cpe:2.3:o:mbconnectline:mbspider_mdh_905_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mbconnectline:mbnet_hw1_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:* cpe:2.3:o:mbconnectline:mbnet.rokey_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:helmholz:rex_300:-:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-Other | |
First Time |
Mbconnectline mbspider Mdh 906 Firmware
Mbconnectline Mbconnectline mbnet Mbconnectline mbspider Mdh 905 Firmware Helmholz rex 200 Helmholz Mbconnectline mbspider Mdh 916 Firmware Mbconnectline mbspider Mdh 905 Helmholz rex 300 Firmware Mbconnectline mymbconnect24 Helmholz rex 300 Helmholz rex 250 Mbconnectline mbnet Hw1 Firmware Mbconnectline mbspider Mdh 906 Helmholz rex 200 Firmware Mbconnectline mbnet.rokey Mbconnectline mbnet Firmware Mbconnectline mbnet.rokey Firmware Helmholz rex 250 Firmware Helmholz myrex24 V2 Virtual Server Mbconnectline mbnet Hw1 Mbconnectline mbconnect24 Mbconnectline mbspider Mdh 915 Firmware Mbconnectline mbspider Mdh 915 Mbconnectline mbspider Mdh 916 |
15 Oct 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Oct 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-15 11:15
Updated : 2024-11-21 09:37
NVD link : CVE-2024-45272
Mitre link : CVE-2024-45272
CVE.ORG link : CVE-2024-45272
JSON object : View
Products Affected
mbconnectline
- mbspider_mdh_905_firmware
- mbspider_mdh_906
- mbnet_hw1_firmware
- mbnet.rokey
- mbspider_mdh_915
- mbspider_mdh_916_firmware
- mbnet.rokey_firmware
- mbnet_firmware
- mbspider_mdh_905
- mbspider_mdh_915_firmware
- mbspider_mdh_916
- mymbconnect24
- mbspider_mdh_906_firmware
- mbconnect24
- mbnet_hw1
- mbnet
helmholz
- rex_250
- rex_200
- myrex24_v2_virtual_server
- rex_300
- rex_300_firmware
- rex_250_firmware
- rex_200_firmware
CWE