CVE-2024-45272

An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.
Configurations

Configuration 1 (hide)

cpe:2.3:a:helmholz:myrex24_v2_virtual_server:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:helmholz:rex_300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_300:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:helmholz:rex_200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_200:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:helmholz:rex_250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_250:-:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*
cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:mbconnectline:mbspider_mdh_905_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_905:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:mbconnectline:mbspider_mdh_915_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_915:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:mbconnectline:mbspider_mdh_906_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_906:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:mbconnectline:mbspider_mdh_916_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_916:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:mbconnectline:mbnet_hw1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet_hw1:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:mbconnectline:mbnet_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:mbconnectline:mbnet.rokey_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet.rokey:-:*:*:*:*:*:*:*

History

21 Nov 2024, 09:37

Type Values Removed Values Added
References
  • () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-061.txt -

17 Oct 2024, 17:42

Type Values Removed Values Added
References () https://cert.vde.com/en/advisories/VDE-2024-068 - () https://cert.vde.com/en/advisories/VDE-2024-068 - Third Party Advisory
References () https://cert.vde.com/en/advisories/VDE-2024-069 - () https://cert.vde.com/en/advisories/VDE-2024-069 - Third Party Advisory
CPE cpe:2.3:h:mbconnectline:mbnet.rokey:-:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbspider_mdh_906_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*
cpe:2.3:a:helmholz:myrex24_v2_virtual_server:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet_hw1:-:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbspider_mdh_915_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_915:-:*:*:*:*:*:*:*
cpe:2.3:o:helmholz:rex_250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbnet_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_916:-:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_200:-:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_906:-:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbspider_mdh_916_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_905:-:*:*:*:*:*:*:*
cpe:2.3:o:helmholz:rex_200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:helmholz:rex_300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_250:-:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet:-:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbspider_mdh_905_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbnet_hw1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbnet.rokey_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_300:-:*:*:*:*:*:*:*
CWE NVD-CWE-Other
First Time Mbconnectline mbspider Mdh 906 Firmware
Mbconnectline
Mbconnectline mbnet
Mbconnectline mbspider Mdh 905 Firmware
Helmholz rex 200
Helmholz
Mbconnectline mbspider Mdh 916 Firmware
Mbconnectline mbspider Mdh 905
Helmholz rex 300 Firmware
Mbconnectline mymbconnect24
Helmholz rex 300
Helmholz rex 250
Mbconnectline mbnet Hw1 Firmware
Mbconnectline mbspider Mdh 906
Helmholz rex 200 Firmware
Mbconnectline mbnet.rokey
Mbconnectline mbnet Firmware
Mbconnectline mbnet.rokey Firmware
Helmholz rex 250 Firmware
Helmholz myrex24 V2 Virtual Server
Mbconnectline mbnet Hw1
Mbconnectline mbconnect24
Mbconnectline mbspider Mdh 915 Firmware
Mbconnectline mbspider Mdh 915
Mbconnectline mbspider Mdh 916

15 Oct 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) Un atacante remoto no autenticado puede realizar un ataque de fuerza bruta a las credenciales del portal de servicio remoto con una alta probabilidad de éxito, lo que da como resultado la pérdida de la conexión.

15 Oct 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-15 11:15

Updated : 2024-11-21 09:37


NVD link : CVE-2024-45272

Mitre link : CVE-2024-45272

CVE.ORG link : CVE-2024-45272


JSON object : View

Products Affected

mbconnectline

  • mbspider_mdh_905_firmware
  • mbspider_mdh_906
  • mbnet_hw1_firmware
  • mbnet.rokey
  • mbspider_mdh_915
  • mbspider_mdh_916_firmware
  • mbnet.rokey_firmware
  • mbnet_firmware
  • mbspider_mdh_905
  • mbspider_mdh_915_firmware
  • mbspider_mdh_916
  • mymbconnect24
  • mbspider_mdh_906_firmware
  • mbconnect24
  • mbnet_hw1
  • mbnet

helmholz

  • rex_250
  • rex_200
  • myrex24_v2_virtual_server
  • rex_300
  • rex_300_firmware
  • rex_250_firmware
  • rex_200_firmware
CWE
CWE-1391

Use of Weak Credentials

NVD-CWE-Other