VDE-2023-008

Vulnerability from csaf_helmholzgmbhcokg - Published: 2023-05-15 12:06 - Updated: 2023-05-15 12:06
Summary
Helmholz: Multiple vulnerabilites in myREX24 and myREX24.virtual
Notes
Summary: Two vulnerabilites have been discovered in myREX24 and myREX24.virtual in all versions through 2.13.3.
Impact: Please consult the CVE Entries.
Mitigation: Mitigation for CVE-2023-0985: If you have MFA enabled on the admin user, the password will still be set, but the attacker will be unable to login as the MFA is still in place.
Remediation: Update to latest Version: 2.13.4

An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version <= 2.13.3. An authenticated remote user with low privileges can change the password of any user in the same account. This allows to take over the admin user and therefore fully compromise the account.

CWE-639 - Authorization Bypass Through User-Controlled Key
Mitigation Mitigation for CVE-2023-0985: If you have MFA enabled on the admin user, the password will still be set, but the attacker will be unable to login as the MFA is still in place.
Vendor Fix Update to latest Version: 2.13.4

Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remote attacker with low privileges to view a limited amount of another accounts contact information.

CWE-863 - Incorrect Authorization
Mitigation Mitigation for CVE-2023-0985: If you have MFA enabled on the admin user, the password will still be set, but the attacker will be unable to login as the MFA is still in place.
Vendor Fix Update to latest Version: 2.13.4
Acknowledgments
CERT@VDE certvde.com
Hussein Alsharafi

{
  "document": {
    "acknowledgments": [
      {
        "organization": "CERT@VDE",
        "summary": "coordination",
        "urls": [
          "https://certvde.com"
        ]
      },
      {
        "organization": "Hussein Alsharafi",
        "summary": "reporting"
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-GB",
    "notes": [
      {
        "category": "summary",
        "text": "Two vulnerabilites have been discovered in\u00a0myREX24\u00a0and\u00a0myREX24.virtual\u00a0in all versions through\u00a02.13.3.",
        "title": "Summary"
      },
      {
        "category": "description",
        "text": "Please consult the CVE Entries.",
        "title": "Impact"
      },
      {
        "category": "description",
        "text": "Mitigation for\u00a0CVE-2023-0985:\nIf you have MFA enabled on the admin user, the password will still be set, but the attacker will be unable to login as the MFA is still in place.",
        "title": "Mitigation"
      },
      {
        "category": "description",
        "text": "Update to latest Version: 2.13.4",
        "title": "Remediation"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "psirt@helmholz.de",
      "name": "Helmholz GmbH \u0026 Co. KG",
      "namespace": "https://www.helmholz.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "VDE-2023-008: Helmholz: Multiple vulnerabilites in myREX24 and myREX24.virtual - HTML",
        "url": "https://certvde.com/en/advisories/VDE-2023-008/"
      },
      {
        "category": "self",
        "summary": "VDE-2023-008: Helmholz: Multiple vulnerabilites in myREX24 and myREX24.virtual - CSAF",
        "url": "https://helmholz.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-008.json"
      },
      {
        "category": "external",
        "summary": "Vendor PSIRT",
        "url": "https://www.helmholz.de"
      },
      {
        "category": "external",
        "summary": "CERT@VDE Security Advisories for Helmholz GmbH \u0026 Co. KG",
        "url": "https://certvde.com/en/advisories/vendor/helmholz/"
      }
    ],
    "title": "Helmholz: Multiple vulnerabilites in myREX24 and myREX24.virtual",
    "tracking": {
      "aliases": [
        "VDE-2023-008"
      ],
      "current_release_date": "2023-05-15T12:06:00.000Z",
      "generator": {
        "date": "2025-04-24T19:54:54.427Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.5.24"
        }
      },
      "id": "VDE-2023-008",
      "initial_release_date": "2023-05-15T12:06:00.000Z",
      "revision_history": [
        {
          "date": "2023-05-15T12:06:00.000Z",
          "number": "1",
          "summary": "Initial revision."
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "\u003c=2.13.3",
                    "product": {
                      "name": "myREX24 \u003c=2.13.3",
                      "product_id": "CSAFPID-51001"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "2.13.4",
                    "product": {
                      "name": "myREX24 2.13.4",
                      "product_id": "CSAFPID-52001"
                    }
                  }
                ],
                "category": "product_name",
                "name": "myREX24"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "\u003c=2.13.3",
                    "product": {
                      "name": "myREX24.virtual \u003c=2.13.3",
                      "product_id": "CSAFPID-51002"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "2.13.4",
                    "product": {
                      "name": "myREX24.virtual 2.13.4",
                      "product_id": "CSAFPID-52002"
                    }
                  }
                ],
                "category": "product_name",
                "name": "myREX24.virtual"
              }
            ],
            "category": "product_family",
            "name": "Software"
          }
        ],
        "category": "vendor",
        "name": "Helmholz"
      }
    ],
    "product_groups": [
      {
        "group_id": "CSAFGID-0001",
        "product_ids": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ],
        "summary": "Affected products."
      },
      {
        "group_id": "CSAFGID-0002",
        "product_ids": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "summary": "Fixed products."
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-0985",
      "cwe": {
        "id": "CWE-639",
        "name": "Authorization Bypass Through User-Controlled Key"
      },
      "notes": [
        {
          "category": "description",
          "text": "An Authorization Bypass vulnerability was found in MB Connect Lines\u00a0mbCONNECT24, mymbCONNECT24 and Helmholz\u0027 myREX24 and myREX24.virtual version \u003c= 2.13.3.\u00a0An authenticated remote user with low privileges can change the password of any user in the same account. This allows to take over the admin user and therefore fully compromise the account.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Mitigation for\u00a0CVE-2023-0985:\nIf you have MFA enabled on the admin user, the password will still be set, but the attacker will be unable to login as the MFA is still in place.",
          "group_ids": [
            "CSAFGID-0001"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to latest Version: 2.13.4",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 8.8,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 8.8,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2023-0985"
    },
    {
      "cve": "CVE-2023-1779",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "description",
          "text": "Exposure of Sensitive Information to an unauthorized actor vulnerability\u00a0in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz\u0027 myREX24 and myREX24.virtual in versions \u003c=2.13.3 allow an authorized remote attacker with low privileges to view a limited amount of another accounts contact information.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-52001",
          "CSAFPID-52002"
        ],
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Mitigation for\u00a0CVE-2023-0985:\nIf you have MFA enabled on the admin user, the password will still be set, but the attacker will be unable to login as the MFA is still in place.",
          "group_ids": [
            "CSAFGID-0001"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to latest Version: 2.13.4",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "environmentalScore": 4.3,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 4.3,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002"
          ]
        }
      ],
      "title": "CVE-2023-1779"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…