First published: Wed Oct 27 2021(Updated: )
In mymbCONNECT24, mbCONNECT24 <= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mbconnectline Mbconnect24 | <=2.9.0 | |
Mbconnectline Mymbconnect24 | <=2.9.0 |
Update to version 2.10.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-34580.
The severity of CVE-2021-34580 is high with a CVSS score of 7.5.
The affected software for CVE-2021-34580 is mbCONNECT24 <= 2.9.0.
An unauthenticated user can exploit CVE-2021-34580 by checking the response the server sends for crafted invalid login attempts to enumerate valid backend users.
Yes, it is recommended to update to a version higher than 2.9.0 to mitigate the vulnerability.