VDE-2021-003

Vulnerability from csaf_mbconnectlinegmbh - Published: 2022-09-07 10:46 - Updated: 2022-09-07 10:46
Summary
MB connect line: Multiple vulnerabilites in mymbCONNECT24 and mbCONNECT24 (Update A)
Notes
Summary: Multiple vulnerabilities have been found in mymbCONNECT24 and mbCONNECT24. Update A, 2022-09-07: Affected Products: updated affected versions due to incomplete fixes of some CVEs. See Solution for details. Solution: updated version information. Solution: Added Fix for CVE-2020-35561. Solution: Added MFA remark for CVE-2020-35565.
Impact: please see cve id entries
Remediation: CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. There is an XSS issue in the redirect.php allowing an attacker to inject code via a get parameter.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. Improper use of access validation allows a logged in user to kill web2go sessions in the account he should not have access to.

CWE-269 - Improper Privilege Management
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2 There is a SSRF in the LDAP access check, allowing an attacker to scan for open ports.

CWE-918 - Server-Side Request Forgery (SSRF)
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. Improper access validation allows a logged in user to shutdown or reboot devices in his account without having corresponding permissions.

CWE-269 - Improper Privilege Management
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.6.1. There is a local privilege escalation from the www-data account to the root account.

CWE-269 - Improper Privilege Management
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. There is an SSRF in the HA module allowing an unauthenticated attacker to scan for open ports.

CWE-918 - Server-Side Request Forgery (SSRF)
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. The login pages bruteforce detection is disabled by default.

CWE-307 - Improper Restriction of Excessive Authentication Attempts
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. The software uses a secure password for database access, but this password is shared across instances.

CWE-798 - Use of Hard-coded Credentials
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. An incomplete filter applied to a database response allows an authenticated attacker to gain non-public information about other users and devices in the account.

CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an unused function that allows an authenticated attacker to use up all available IPs of an account and thus not allow creation of new devices and users.

CWE-400 - Uncontrolled Resource Consumption
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. An attacker can read arbitrary JSON files via Local File Inclusion.

CWE-706 - Use of Incorrectly-Resolved Name or Reference
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is a self XSS issue with a crafted cookie in the login page.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an outdated and unused component allowing for malicious user input of active code.

CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an incomplete XSS filter allowing an attacker to inject crafted malicious code into the page.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an unauthenticated open redirect in the redirect.php.

CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual through 2.11.2. There is an SSRF in the in the MySQL access check, allowing an attacker to scan for open ports and gain some information about possible credentials.

CWE-918 - Server-Side Request Forgery (SSRF)
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual through 2.11.2. An unauthenticated attacker is able to access files (that should have been restricted) via forceful browsing.

CWE-425 - Direct Request ('Forced Browsing')
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1

An issue in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 allows a logged in user to see devices in the account he should not have access to due to improper use of access validation.

CWE-269 - Improper Privilege Management
Vendor Fix CVE-2020-12528, CVE-2020-12529, CVE-2020-35560, CVE-2020-12530, CVE-2020-35563, CVE-2020-35564, CVE-2020-35569, CVE-2020-35559, Update to version >= 2.7.1 CVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data. Note: This issue only exists up until version 2.6.1 and has already been addressed in >= 2.6.2 CVE-2020-35567: None Note: A proper fix for the underlying issue will come with a future architectural core-system-update. CVE-2020-35565: None Mitigation: Activate bruteforce detection via Security → Fail2Ban → WebLogin Note: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA. CVE-2020-35561: Update to version 2.12.1 Update A, 2022-09-07: CVE-2020-35557, CVE-2020-35570, CVE-2020-35558, CVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1
Acknowledgments
CERT@VDE certvde.com

{
  "document": {
    "acknowledgments": [
      {
        "organization": "CERT@VDE",
        "summary": "coordination",
        "urls": [
          "https://certvde.com"
        ]
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-GB",
    "notes": [
      {
        "category": "summary",
        "text": "Multiple vulnerabilities have been found in mymbCONNECT24 and mbCONNECT24.\nUpdate A, 2022-09-07:\n\nAffected Products: updated affected versions due to incomplete fixes of some CVEs. See Solution for details.\nSolution: updated version information.\nSolution: Added Fix for\u00a0CVE-2020-35561.\nSolution: Added\u00a0MFA remark for\u00a0CVE-2020-35565.",
        "title": "Summary"
      },
      {
        "category": "description",
        "text": "please see cve id entries",
        "title": "Impact"
      },
      {
        "category": "description",
        "text": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
        "title": "Remediation"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "security-team@mbconnectline.de",
      "name": "MB connect line GmbH",
      "namespace": "https://mbconnectline.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "VDE-2021-003: MB connect line: Multiple vulnerabilites in mymbCONNECT24 and mbCONNECT24 (Update A) - HTML",
        "url": "https://certvde.com/en/advisories/VDE-2021-003/"
      },
      {
        "category": "self",
        "summary": "VDE-2021-003: MB connect line: Multiple vulnerabilites in mymbCONNECT24 and mbCONNECT24 (Update A) - CSAF",
        "url": "https://mbconnectline.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2021-003.json"
      },
      {
        "category": "external",
        "summary": "MB connect line PSIRT",
        "url": "https://mbconnectline.com/security/"
      },
      {
        "category": "external",
        "summary": "CERT@VDE Security Advisories for MB connect line GmbH",
        "url": "https://certvde.com/en/advisories/vendor/mbconnectline/"
      }
    ],
    "title": "MB connect line: Multiple vulnerabilites in mymbCONNECT24 and mbCONNECT24 (Update A)",
    "tracking": {
      "aliases": [
        "VDE-2021-003"
      ],
      "current_release_date": "2022-09-07T10:46:00.000Z",
      "generator": {
        "date": "2025-05-05T09:20:59.210Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.5.24"
        }
      },
      "id": "VDE-2021-003",
      "initial_release_date": "2022-09-07T10:46:00.000Z",
      "revision_history": [
        {
          "date": "2022-09-07T10:46:00.000Z",
          "number": "1",
          "summary": "Initial revision."
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "\u003c=2.11.2",
                    "product": {
                      "name": "mbCONNECT24 \u003c= 2.11.2",
                      "product_id": "CSAFPID-51001"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "2.12.1",
                    "product": {
                      "name": "mbCONNECT24 2.12.1",
                      "product_id": "CSAFPID-52001"
                    }
                  }
                ],
                "category": "product_name",
                "name": "mbCONNECT24"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "\u003c=2.11.2",
                    "product": {
                      "name": "mymbCONNECT24 \u003c= 2.11.2",
                      "product_id": "CSAFPID-51002"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "2.12.1",
                    "product": {
                      "name": "mymbCONNECT24 2.12.1",
                      "product_id": "CSAFPID-52002"
                    }
                  }
                ],
                "category": "product_name",
                "name": "mymbCONNECT24"
              }
            ],
            "category": "product_family",
            "name": "Software"
          }
        ],
        "category": "vendor",
        "name": "MB connect line"
      }
    ],
    "product_groups": [
      {
        "group_id": "CSAFGID-0001",
        "product_ids": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ],
        "summary": "Affected products."
      },
      {
        "group_id": "CSAFGID-0002",
        "product_ids": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "summary": "Fixed products."
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-12530",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. There is an XSS issue in the redirect.php allowing an attacker to inject code via a get parameter.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "environmentalScore": 6.1,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "temporalScore": 6.1,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-12530"
    },
    {
      "cve": "CVE-2020-12528",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. Improper use of access validation allows a logged in user to kill web2go sessions in the account he should not have access to.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "environmentalScore": 7.7,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "temporalScore": 7.7,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-12528"
    },
    {
      "cve": "CVE-2020-12529",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2 There is a SSRF in the LDAP access check, allowing an attacker to scan for open ports.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "environmentalScore": 5.3,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 5.3,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-12529"
    },
    {
      "cve": "CVE-2020-12527",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. Improper access validation allows a logged in user to shutdown or reboot devices in his account without having corresponding permissions.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "environmentalScore": 6.5,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 6.5,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-12527"
    },
    {
      "cve": "CVE-2020-10384",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.6.1. There is a local privilege escalation from the www-data account to the root account.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 7.8,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 7.8,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-10384"
    },
    {
      "cve": "CVE-2020-35561",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. There is an SSRF in the HA module allowing an unauthenticated attacker to scan for open ports.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "environmentalScore": 5.3,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 5.3,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35561"
    },
    {
      "cve": "CVE-2020-35565",
      "cwe": {
        "id": "CWE-307",
        "name": "Improper Restriction of Excessive Authentication Attempts"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. The login pages bruteforce detection is disabled by default.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 9.8,
            "environmentalSeverity": "CRITICAL",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 9.8,
            "temporalSeverity": "CRITICAL",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35565"
    },
    {
      "cve": "CVE-2020-35567",
      "cwe": {
        "id": "CWE-798",
        "name": "Use of Hard-coded Credentials"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. The software uses a secure password for database access, but this password is shared across instances.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 7.8,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 7.8,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35567"
    },
    {
      "cve": "CVE-2020-35568",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. An incomplete filter applied to a database response allows an authenticated attacker to gain non-public information about other users and devices in the account.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "environmentalScore": 4.3,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 4.3,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35568"
    },
    {
      "cve": "CVE-2020-35559",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an unused function that allows an authenticated attacker to use up all available IPs of an account and thus not allow creation of new devices and users.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "environmentalScore": 4.3,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 4.3,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35559"
    },
    {
      "cve": "CVE-2020-35566",
      "cwe": {
        "id": "CWE-706",
        "name": "Use of Incorrectly-Resolved Name or Reference"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. An attacker can read arbitrary JSON files via Local File Inclusion.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "environmentalScore": 5.3,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 5.3,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35566"
    },
    {
      "cve": "CVE-2020-35569",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is a self XSS issue with a crafted cookie in the login page.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "environmentalScore": 6.1,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "temporalScore": 6.1,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35569"
    },
    {
      "cve": "CVE-2020-35564",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an outdated and unused component allowing for malicious user input of active code.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "environmentalScore": 7.5,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 7.5,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35564"
    },
    {
      "cve": "CVE-2020-35563",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an incomplete XSS filter allowing an attacker to inject crafted malicious code into the page.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "environmentalScore": 5.4,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "temporalScore": 5.4,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35563"
    },
    {
      "cve": "CVE-2020-35560",
      "cwe": {
        "id": "CWE-601",
        "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an unauthenticated open redirect in the redirect.php.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "environmentalScore": 6.1,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "temporalScore": 6.1,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35560"
    },
    {
      "cve": "CVE-2020-35558",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual through 2.11.2. There is an SSRF in the in the MySQL access check, allowing an attacker to scan for open ports and gain some information about possible credentials.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 7.5,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 7.5,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35558"
    },
    {
      "cve": "CVE-2020-35570",
      "cwe": {
        "id": "CWE-425",
        "name": "Direct Request (\u0027Forced Browsing\u0027)"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual through 2.11.2. An unauthenticated attacker is able to access files (that should have been restricted) via forceful browsing.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "environmentalScore": 5.3,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 5.3,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35570"
    },
    {
      "cve": "CVE-2020-35557",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 allows a logged in user to see devices in the account he should not have access to due to improper use of access validation.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "CVE-2020-12528, CVE-2020-12529, CVE-2020-35560,\nCVE-2020-12530, CVE-2020-35563, CVE-2020-35564,\nCVE-2020-35569, CVE-2020-35559,  Update to version \u003e= 2.7.1\n\nCVE-2020-10384: Update to version 2.6.2 to close any known way to get to www-data.\nNote: This issue only exists up until version 2.6.1 and has already been addressed in \u003e= 2.6.2\n\nCVE-2020-35567: None\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update.\n\nCVE-2020-35565: None\nMitigation: Activate bruteforce detection via Security \u2192 Fail2Ban \u2192 WebLogin\nNote: A proper fix for the underlying issue will come with a future architectural core-system-update. To further increase the security level of your account enable MFA.\n\nCVE-2020-35561: Update to version 2.12.1\n\nUpdate A, 2022-09-07:\n\nCVE-2020-35557, CVE-2020-35570, CVE-2020-35558,\nCVE-2020-35566, CVE-2020-12527, CVE-2020-35568: Update to version 2.12.1",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 6.5,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 6.5,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2020-35557"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…