Helmholz: Multiple Vulnerabilities in Helmholz products
Multiple critical vulnerabilities have been discovered in Helmholz controllers affecting CVE-2024-45272, CVE-2024-45273, and CVE-2024-45275. These vulnerabilities exploit hardcoded credentials (CWE-798), missing authentication (CWE-261), and initialization with hard-coded network resource configuration passwords (CWE-1391) in the myREX24V2, myREX24V2.virtual, REX 200, and REX 250 products. Successful exploitation allows remote code execution, unauthorized file access, and control logic manipulation. REX 300 is end-of-life and will not receive security updates.
- Network access to the web management interface or API port of the affected Helmholz device (typically port 80/443)
- No authentication required for at least one of the three vulnerabilities
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f78527a7-1bc5-4d26-98f8-65253cfb31e2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.