First published: Mon Aug 02 2021(Updated: )
In MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mbconnectline Mbconnect24 | <=2.11.2 | |
Mbconnectline Mymbconnect24 | <=2.11.2 | |
Helmholz myREX24 | <=2.11.2 | |
Helmholz Myrex24.virtual | <=2.11.2 |
Update to version 2.12.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-34574.
The severity level of CVE-2021-34574 is medium.
CVE-2021-34574 affects all versions up to and including v2.11.2 of mbCONNECT24, mymbCONNECT24, myREX24, and myREX24.virtual.
An authenticated attacker can exploit CVE-2021-34574 by intercepting and modifying the request to change their account password into a new password that violates the password policy.
Yes, you can find references for CVE-2021-34574 at the following links: [VDE-2021-030](https://cert.vde.com/en/advisories/VDE-2021-030) and [VDE-2022-039](https://cert.vde.com/en/advisories/VDE-2022-039).