Summary
Multiple vulnerabilities have been discovered in MB connect line products that could allow RCE or unauthorized file access.
CVE-2024-45272 affects the mbCONNECT24 and mymbCONNECT24 products.
CVE-2024-45273 affects the mbNET/mbNET.rokey, mbCONNECT24, mymbCONNECT24, mbNET HW1, and mbSPIDER products.
CVE-2024-45275 affects only the mbNET HW1 product.
Impact
CVE-2024-45272 allows brute-force attacks against remote credentials with a high probability of success.
CVE-2024-45273 allows undetectable tampering and manipulation of encrypted configuration files.
CVE-2024-45275 allow remote code execution with system privileges, resulting in full compromise of the device
Affected Product(s)
| Model no. | Product name | Affected versions |
|---|---|---|
| MB connect line mbCONNECT24 | Firmware <=2.16.2 | |
| MDH 810 (HW01), MDH 811 (HW01), MDH 814 (HW01), MDH 815 (HW01), DH 816 (HW01), DH 819 (HW01), MDH 830 (HW01), MDH 831 (HW01), MDH 834 (HW01) , MDH 835 (HW01), DH 841 (HW01), MDH 849 (HW01), DH 850 EU (HW01), MDH 850 AT&T (HW01), DH 855 EU (HW01), MDH 855 AT&T (HW01), MDH 858 EU (HW01), MDH 858 AT&T (HW01), MDH 859 EU (HW01), MDH 859 AT&T (HW01) | mbNET HW1 | Firmware <=5.1.11 |
| MDH 811, MDH 816, MDH 831, MDH 835, MDH 841, MDH 850 EU, MDH 850 US, MDH 855 EU, MDH 855 US, MDH 859 EU, MDH 859 US, MDH 871, MDH 876, RKH 210, RKH 216, RKH 235, RKH 259 EU, RKH 259 US | mbNET/mbNET.rokey | Firmware <=8.2.0 |
| MDH 900, MDH 901, MDH 905, MDH 906, MDH 907, MDH 908, MDH 910, MDH 911, MDH 915, MDH 916, MDH 918 | mbSPIDER | Firmware <=2.6.5 |
| mymbCONNECT24 | Firmware <=2.16.2 |
Vulnerabilities
Expand / Collapse allThe devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices.
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.
Remediation
Update mbNET/mbNET.rokey to the version 8.2.1\
Update mbCONNECT24, mymbCONNECT24 to the version 2.16.3\
Note: mbNET HW1 and mbSPIDER are EOL and will not receive any further updates.
Acknowledgments
MB connect line GmbH thanks the following parties for their efforts:
- CERT@VDE for coordination (see https://certvde.com )
- Moritz Abrell from SySS GmbH for reporting (see https://www.syss.de )
- Marcel Rick-Cen for reporting
Revision History
| Version | Date | Summary |
|---|---|---|
| 1.0.0 | 10/15/2024 10:00 | Initial revision. |
| 2.0.0 | 11/06/2024 12:27 | Fix: correct certvde domain, added self-reference |
| 3.0.0 | 05/14/2025 14:28 | Fix: version space |
| 4.0.0 | 03/06/2026 09:00 | Added CVE-2024-45275 |