First published: Tue Feb 16 2021(Updated: )
An issue was discovered MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. There is an SSRF in the HA module allowing an unauthenticated attacker to scan for open ports.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mbconnectline Mbconnect24 | <=2.11.2 | |
Mbconnectline Mymbconnect24 | <=2.11.2 | |
Helmholz myREX24 | <=2.11.2 | |
Helmholz Myrex24.virtual | <=2.11.2 |
Update to 2.12.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-35561 is medium.
The vulnerability in MB connect line mymbCONNECT24, mbCONNECT24, Helmholz myREX24, and myREX24.virtual is SSRF (Server-Side Request Forgery) in the HA (High Availability) module.
An unauthenticated attacker can exploit CVE-2020-35561 by scanning for open ports through the SSRF vulnerability in the HA module.
All versions up to and including v2.11.2 of MB connect line mymbCONNECT24, mbCONNECT24, Helmholz myREX24, and myREX24.virtual are affected by CVE-2020-35561.
You can find more information about CVE-2020-35561 on the following references: [https://cert.vde.com/en/advisories/VDE-2021-003](https://cert.vde.com/en/advisories/VDE-2021-003), [https://cert.vde.com/en/advisories/VDE-2022-039](https://cert.vde.com/en/advisories/VDE-2022-039), [https://mbconnectline.com/security-advice/](https://mbconnectline.com/security-advice/).