MB connect line mbCONNECT24, mymbCONNECT24
MB connect line's mbCONNECT24 and mymbCONNECT24 remote access gateways contain multiple vulnerabilities including weak authentication (CWE-798 hardcoded credentials), injection flaws (CWE-79 XSS, CWE-918 SSRF), insufficient access controls (CWE-269), resource exhaustion (CWE-400), and information disclosure (CWE-200, CWE-522). Successful exploitation could allow unauthorized access to sensitive information or remote code execution on the gateway. The devices are used to provide remote access to industrial control systems and connected equipment. mymbCONNECT24 version 2.6.1 and earlier are vulnerable. MB connect line recommends updating to Version 2.71 or higher, though a future release will be needed to fully address CVE-2020-35567, CVE-2020-35565, and CVE-2020-35561.
- Network access to the mbCONNECT24 or mymbCONNECT24 web interface (port 443 or 80)
- User credentials or ability to exploit default/weak credentials
- Device running vulnerable version 2.6.1 or earlier (mymbCONNECT24)
- Device not behind adequate firewall protection
Patching may require device reboot — plan for process interruption
/api/v1/advisories/802d2daf-7d90-4290-810d-706b246076c3