VDE-2025-035

Vulnerability from csaf_mbconnectlinegmbh - Published: 2025-06-24 10:00 - Updated: 2025-06-24 10:00
Summary
Vulnerabilities in mbCONNECT24/mymbCONNECT24
Severity
Critical
Notes
Summary: Two vulnerabilities in mbCONNECT24/mymbCONNECT24 can lead to user enumeration an password bypass.
Impact: CVE-2025-3091: An attacker in possession of the second factor for an user can login as that user without knowledge of the password (first factor) CVE-2025-3092: An unprotected endpoint can by used to enumerate valid user names.
Remediation: CVE-2025-3091: Update to latest version: 2.16.5 CVE-2025-3092: Update to latest version: 2.18.0
General Recommendation: Always use the latest available firmware version on all devices.

An low privileged remote attacker in possession of the second factor for another user can login as that user without knowledge of the other user`s password.

CWE-639 - Authorization Bypass Through User-Controlled Key
Vendor Fix Update to latest version: 2.16.5

An unauthenticated remote attacker can enumerate valid user names from an unprotected endpoint.

CWE-204 - Observable Response Discrepancy
Vendor Fix Update to latest version: 2.18.0
Acknowledgments
CERT@VDE certvde.com
Eviden Peter Husted Simonsen Irwin Przeperski

{
  "document": {
    "acknowledgments": [
      {
        "organization": "CERT@VDE",
        "summary": "coordination",
        "urls": [
          "https://certvde.com"
        ]
      },
      {
        "names": [
          "Peter Husted Simonsen",
          "Irwin Przeperski"
        ],
        "organization": "Eviden",
        "summary": "reporting"
      }
    ],
    "aggregate_severity": {
      "namespace": "https://mbconnectline.com",
      "text": "critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "en-GB",
    "notes": [
      {
        "category": "summary",
        "text": "Two vulnerabilities in mbCONNECT24/mymbCONNECT24 can lead to user enumeration an password bypass.",
        "title": "Summary"
      },
      {
        "category": "description",
        "text": "CVE-2025-3091: An attacker in possession of the second factor for an user can login as that user without knowledge of the password (first factor)\n\nCVE-2025-3092: An unprotected endpoint can by used to enumerate valid user names.",
        "title": "Impact"
      },
      {
        "category": "description",
        "text": "CVE-2025-3091: Update to latest version: 2.16.5\n\nCVE-2025-3092: Update to latest version: 2.18.0",
        "title": "Remediation"
      },
      {
        "category": "general",
        "text": "Always use the latest available firmware version on all devices.",
        "title": "General Recommendation"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "security-team@mbconnectline.de",
      "name": "MB connect line GmbH",
      "namespace": "https://mbconnectline.com"
    },
    "references": [
      {
        "category": "external",
        "summary": "MB connect line GmbH Advisories",
        "url": "https://mbconnectline.com/security-advice"
      },
      {
        "category": "external",
        "summary": "CERT@VDE Security Advisories for MB connect line GmbH",
        "url": "https://certvde.com/en/advisories/vendor/mbconnectline"
      },
      {
        "category": "self",
        "summary": "VDE-2025-035: Vulnerabilities in mbCONNECT24/mymbCONNECT24 - HTML",
        "url": "https://certvde.com/en/advisories/VDE-2025-035"
      },
      {
        "category": "self",
        "summary": "VDE-2025-035: Vulnerabilities in mbCONNECT24/mymbCONNECT24 - CSAF",
        "url": "https://mbconnectline.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-035.json"
      }
    ],
    "title": "Vulnerabilities in mbCONNECT24/mymbCONNECT24",
    "tracking": {
      "aliases": [
        "VDE-2025-035"
      ],
      "current_release_date": "2025-06-24T10:00:00.000Z",
      "generator": {
        "date": "2025-06-16T07:15:43.019Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.5.26"
        }
      },
      "id": "VDE-2025-035",
      "initial_release_date": "2025-06-24T10:00:00.000Z",
      "revision_history": [
        {
          "date": "2025-06-24T10:00:00.000Z",
          "number": "1",
          "summary": "Initial revision."
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_name",
                    "name": "mbCONNECT24",
                    "product": {
                      "name": "mbCONNECT24",
                      "product_id": "CSAFPID-11001"
                    }
                  },
                  {
                    "category": "product_name",
                    "name": "mymbCONNECT24",
                    "product": {
                      "name": "mymbCONNECT24",
                      "product_id": "CSAFPID-11002"
                    }
                  }
                ],
                "category": "product_family",
                "name": "mbCONNECT24"
              }
            ],
            "category": "product_family",
            "name": "Hardware"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "2.18.0",
                "product": {
                  "name": "Firmware 2.18.0",
                  "product_id": "CSAFPID-22001"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c2.18.0",
                "product": {
                  "name": "Firmware \u003c2.18.0",
                  "product_id": "CSAFPID-21002"
                }
              },
              {
                "category": "product_version",
                "name": "2.16.5",
                "product": {
                  "name": "Firmware 2.16.5",
                  "product_id": "CSAFPID-22003"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c2.16.5",
                "product": {
                  "name": "Firmware \u003c2.16.5",
                  "product_id": "CSAFPID-22004"
                }
              }
            ],
            "category": "product_family",
            "name": "Firmware"
          }
        ],
        "category": "vendor",
        "name": "MB connect line GmbH"
      }
    ],
    "product_groups": [
      {
        "group_id": "CSAFGID-0001",
        "product_ids": [
          "CSAFPID-31001",
          "CSAFPID-31002",
          "CSAFPID-33001",
          "CSAFPID-33002"
        ],
        "summary": "Affected products."
      },
      {
        "group_id": "CSAFGID-0002",
        "product_ids": [
          "CSAFPID-32001",
          "CSAFPID-32002",
          "CSAFPID-34001",
          "CSAFPID-34002"
        ],
        "summary": "Fixed products."
      }
    ],
    "relationships": [
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware \u003c2.16.5 installed on mbCONNECT24",
          "product_id": "CSAFPID-31001"
        },
        "product_reference": "CSAFPID-22004",
        "relates_to_product_reference": "CSAFPID-11001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware \u003c2.16.5 installed on mymbCONNECT24",
          "product_id": "CSAFPID-31002"
        },
        "product_reference": "CSAFPID-22004",
        "relates_to_product_reference": "CSAFPID-11002"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware 2.16.5 installed on mbCONNECT24",
          "product_id": "CSAFPID-32001"
        },
        "product_reference": "CSAFPID-22003",
        "relates_to_product_reference": "CSAFPID-11001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware 2.16.5 installed on mymbCONNECT24",
          "product_id": "CSAFPID-32002"
        },
        "product_reference": "CSAFPID-22003",
        "relates_to_product_reference": "CSAFPID-11002"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware \u003c2.18.0 installed on mbCONNECT24",
          "product_id": "CSAFPID-33001"
        },
        "product_reference": "CSAFPID-21002",
        "relates_to_product_reference": "CSAFPID-11001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware \u003c2.18.0 installed on mymbCONNECT24",
          "product_id": "CSAFPID-33002"
        },
        "product_reference": "CSAFPID-21002",
        "relates_to_product_reference": "CSAFPID-11002"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware 2.18.0 installed on mbCONNECT24",
          "product_id": "CSAFPID-34001"
        },
        "product_reference": "CSAFPID-22001",
        "relates_to_product_reference": "CSAFPID-11001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware 2.18.0 installed on mymbCONNECT24",
          "product_id": "CSAFPID-34002"
        },
        "product_reference": "CSAFPID-22001",
        "relates_to_product_reference": "CSAFPID-11002"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-3091",
      "cwe": {
        "id": "CWE-639",
        "name": "Authorization Bypass Through User-Controlled Key"
      },
      "notes": [
        {
          "audience": "all",
          "category": "description",
          "text": "An low privileged remote attacker in possession of the second factor for another user can login as that user without knowledge of the other user`s password.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-32001",
          "CSAFPID-32002"
        ],
        "known_affected": [
          "CSAFPID-31001",
          "CSAFPID-31002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to latest version: 2.16.5",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 7.5,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 7.5,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-31001",
            "CSAFPID-31002"
          ]
        }
      ],
      "title": "CVE-2025-3091"
    },
    {
      "cve": "CVE-2025-3092",
      "cwe": {
        "id": "CWE-204",
        "name": "Observable Response Discrepancy"
      },
      "notes": [
        {
          "audience": "all",
          "category": "description",
          "text": "An unauthenticated remote attacker can enumerate valid user names from an unprotected endpoint.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-34001",
          "CSAFPID-34002"
        ],
        "known_affected": [
          "CSAFPID-33001",
          "CSAFPID-33002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to latest version: 2.18.0",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 7.5,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 7.5,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-33001",
            "CSAFPID-33002"
          ]
        }
      ],
      "title": "CVE-2025-3092"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…