Vulnerabilities in myREX24/myREX24.virtual
Two vulnerabilities in Helmholz myREX24 and myREX24.virtual industrial automation controllers allow user enumeration and password bypass. The user enumeration vulnerability permits attackers to identify valid user accounts through differential error responses. The password bypass vulnerability allows unauthorized access to the system without valid credentials. Both vulnerabilities require network access to the management interface but do not require prior authentication or complex exploitation techniques.
- Network access to the myREX24 or myREX24.virtual management interface (typically port 443 or 80)
- No valid credentials required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5a58ce48-2629-4776-b0c6-f906e7b6f4a5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.