CVE-2024-45272

An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:helmholz:myrex24_v2_virtual_server:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:helmholz:rex_300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_300:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:helmholz:rex_200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_200:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:helmholz:rex_250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_250:-:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*
cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:mbconnectline:mbspider_mdh_905_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_905:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:mbconnectline:mbspider_mdh_915_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_915:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:mbconnectline:mbspider_mdh_906_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_906:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:mbconnectline:mbspider_mdh_916_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_916:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:mbconnectline:mbnet_hw1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet_hw1:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:mbconnectline:mbnet_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:mbconnectline:mbnet.rokey_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet.rokey:-:*:*:*:*:*:*:*

History

17 Oct 2024, 17:42

Type Values Removed Values Added
CWE CWE-1391 NVD-CWE-Other
References () https://cert.vde.com/en/advisories/VDE-2024-068 - () https://cert.vde.com/en/advisories/VDE-2024-068 - Third Party Advisory
References () https://cert.vde.com/en/advisories/VDE-2024-069 - () https://cert.vde.com/en/advisories/VDE-2024-069 - Third Party Advisory
First Time Mbconnectline mbspider Mdh 915
Mbconnectline mbnet.rokey
Mbconnectline mbconnect24
Mbconnectline mbspider Mdh 916
Helmholz myrex24 V2 Virtual Server
Helmholz rex 300
Helmholz rex 200 Firmware
Mbconnectline mbnet Firmware
Helmholz rex 250
Helmholz rex 200
Mbconnectline mbnet
Mbconnectline mbspider Mdh 905
Mbconnectline mymbconnect24
Mbconnectline
Mbconnectline mbspider Mdh 906
Mbconnectline mbnet Hw1 Firmware
Helmholz rex 250 Firmware
Mbconnectline mbspider Mdh 906 Firmware
Mbconnectline mbspider Mdh 916 Firmware
Helmholz rex 300 Firmware
Helmholz
Mbconnectline mbnet Hw1
Mbconnectline mbspider Mdh 905 Firmware
Mbconnectline mbspider Mdh 915 Firmware
Mbconnectline mbnet.rokey Firmware
CPE cpe:2.3:h:helmholz:rex_300:-:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet:-:*:*:*:*:*:*:*
cpe:2.3:o:helmholz:rex_300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_915:-:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbnet_hw1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_905:-:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbspider_mdh_916_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbspider_mdh_905_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_906:-:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet_hw1:-:*:*:*:*:*:*:*
cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbspider_mdh_915_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbspider_mdh_906_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:helmholz:rex_250_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_200:-:*:*:*:*:*:*:*
cpe:2.3:h:helmholz:rex_250:-:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbnet.rokey:-:*:*:*:*:*:*:*
cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbnet_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mbconnectline:mbspider_mdh_916:-:*:*:*:*:*:*:*
cpe:2.3:o:helmholz:rex_200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:helmholz:myrex24_v2_virtual_server:*:*:*:*:*:*:*:*
cpe:2.3:o:mbconnectline:mbnet.rokey_firmware:*:*:*:*:*:*:*:*

15 Oct 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-15 11:15

Updated : 2024-10-17 17:42


NVD link : CVE-2024-45272

Mitre link : CVE-2024-45272


JSON object : View

Products Affected

mbconnectline

  • mymbconnect24
  • mbconnect24
  • mbspider_mdh_906
  • mbspider_mdh_905_firmware
  • mbnet_hw1_firmware
  • mbspider_mdh_905
  • mbnet_hw1
  • mbnet.rokey
  • mbspider_mdh_915_firmware
  • mbnet_firmware
  • mbspider_mdh_915
  • mbspider_mdh_906_firmware
  • mbnet.rokey_firmware
  • mbnet
  • mbspider_mdh_916
  • mbspider_mdh_916_firmware

helmholz

  • rex_300_firmware
  • rex_250
  • rex_250_firmware
  • rex_200
  • rex_200_firmware
  • rex_300
  • myrex24_v2_virtual_server