Описание
In MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server.
Ссылки
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.11.2 (включая)Версия до 2.11.2 (включая)
Одно из
cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*
cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*
Конфигурация 2Версия до 2.11.2 (включая)Версия до 2.11.2 (включая)
Одно из
cpe:2.3:a:helmholz:myrex24:*:*:*:*:*:*:*:*
cpe:2.3:a:helmholz:myrex24.virtual:*:*:*:*:*:*:*:*
EPSS
Процентиль: 49%
0.0026
Низкий
4.3 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-669
CWE-669
Связанные уязвимости
CVSS3: 4.3
github
больше 3 лет назад
In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server.
EPSS
Процентиль: 49%
0.0026
Низкий
4.3 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-669
CWE-669