First published: Tue Oct 15 2024(Updated: )
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Mbconnectline Mbnet.mini Firmware | <2.3.1 | |
Mbconnectline Mbnet.mini | ||
Helmholz Myrex24 V2 Virtual Server | <2.16.3 | |
All of | ||
Helmholz Rex 300 Firmware | <=5.1.11 | |
Helmholz Rex 300 | ||
All of | ||
Helmholz Rex 200 Firmware | <8.2.1 | |
Helmholz REX 200 | ||
All of | ||
Helmholz Rex 250 Firmware | <8.2.1 | |
Helmholz Rex 250 | ||
All of | ||
Helmholz Rex 100 Firmware | <2.3.1 | |
Helmholz Rex 100 | ||
Mbconnectline Mbconnect24 | <2.16.3 | |
Mbconnectline Mymbconnect24 | <2.16.3 | |
All of | ||
Mbconnectline Mbspider Mdh 905 Firmware | <=2.6.5 | |
Mbconnectline Mbspider Mdh 905 | ||
All of | ||
Mbconnectline Mbspider Mdh 915 Firmware | <=2.6.5 | |
Mbconnectline Mbspider Mdh 915 | ||
All of | ||
Mbconnectline Mbspider Mdh 906 Firmware | <=2.6.5 | |
Mbconnectline Mbspider Mdh 906 | ||
All of | ||
Mbconnectline Mbspider Mdh 916 Firmware | <=2.6.5 | |
Mbconnectline Mbspider Mdh 916 | ||
All of | ||
Mbconnectline Mbnet Hw1 Firmware | <=5.1.11 | |
Mbconnectline Mbnet Hw1 | ||
All of | ||
Mbconnectline Mbnet Firmware | <8.2.1 | |
Mbconnectline Mbnet | ||
All of | ||
Mbconnectline Mbnet.rokey Firmware | <8.2.1 | |
Mbconnectline Mbnet.rokey |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45273 has been classified with a severity level that indicates potential risk due to unauthenticated local access allowing decryption of sensitive configuration files.
To fix CVE-2024-45273, upgrade to the latest firmware version that addresses the weak encryption implementation.
CVE-2024-45273 affects devices running specific versions of firmware for products by Mbconnectline and Helmholz.
The risks of CVE-2024-45273 include potential unauthorized access and compromise of device configurations, leading to further attacks.
No, CVE-2024-45273 requires local access for exploitation, making it a concern primarily for environments with physical security vulnerabilities.