Summary
Multiple vulnerabilities have been discovered in Helmholz products that could allow RCE or unauthorized file access.
CVE-2024-45272 affects the myREX24V2 and myREX24V2.virtual products.
CVE-2024-45273 affects the REX 200/REX 250, myREX24V2, myREX24V2.virtual products.
CVE-2024-45275 affects only the REX 200 / REX 250 products.
Impact
CVE-2024-45272 allows brute-force attacks against remote credentials with a high probability of success.
CVE-2024-45273 allows undetectable tampering and manipulation of encrypted configuration files.
CVE-2024-45275 allow remote code execution with system privileges, resulting in full compromise of the device
Affected Product(s)
| Model no. | Product name | Affected versions |
|---|---|---|
| Helmholz myREX24V2 | Firmware <=2.16.2 | |
| 700-877-WAN01, 700-877-WAN02, 700-877-LTE01, 700-877-LTE02, 700-877-LTE21, 700-877-WIF01, 700-877-WIF02, 700-877-UMT01, 700-878-WAN01, 700-878-WAN02, 700-878-LTE01, 700-878-LTE02, 700-878-LTE11, 700-878-WIF01, 700-878-WIF02, 700-878-UMT01 | REX 200/REX 250 | Firmware <=8.2.0 |
| 700-871-EDG01, 700-871-EDG02, 700-871-ISD01, 700-871-ISD02, 700-871-MDM01, 700-871-MDM02, 700-871-UMT02, 700-872-EDG01, 700-872-EDG02, 700-872-ISD01, 700-872-ISD02, 700-872-MDM01, 700-872-MDM02, 700-872-UMT02 | REX 300 | Firmware <=5.1.11 |
| myREX24V2.virtual | Firmware <=2.16.2 |
Vulnerabilities
Expand / Collapse allThe devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices.
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.
Remediation
Update REX 200 /REX 250 to the version 8.2.1\
Update myREX24V2, myREX24V2.virtual to the version 2.16.3\
Note: REX 300 is EOL and will not receive any further updates.
Acknowledgments
Helmholz GmbH & Co. KG thanks the following parties for their efforts:
- CERT@VDE for coordination (see https://certvde.com )
- Moritz Abrell from SySS GmbH for reporting (see https://www.syss.de )
- Marcel Rick-Cen for reporting
Revision History
| Version | Date | Summary |
|---|---|---|
| 1.0.0 | 15.10.2024 10:00 | Initial revision. |
| 2.0.0 | 06.11.2024 12:27 | Fix: correct certvde domain, added self-reference |
| 3.0.0 | 14.05.2025 14:28 | Fix: version space |
| 4.0.0 | 06.03.2026 09:00 | Added CVE-2024-45275 |