Vulnerability Description
An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mbconnectline | Mbnet.Mini Firmware | < 2.3.1 |
| Mbconnectline | Mbnet.Mini | - |
| Helmholz | Rex 100 Firmware | < 2.3.1 |
| Helmholz | Rex 100 | - |
Related Weaknesses (CWE)
References
- https://cert.vde.com/en/advisories/VDE-2024-056Third Party Advisory
- https://cert.vde.com/en/advisories/VDE-2024-066Third Party Advisory
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-059.t
FAQ
What is CVE-2024-45271?
CVE-2024-45271 is a vulnerability with a CVSS score of 8.4 (HIGH). An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.
How severe is CVE-2024-45271?
CVE-2024-45271 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-45271?
Check the references section above for vendor advisories and patch information. Affected products include: Mbconnectline Mbnet.Mini Firmware, Mbconnectline Mbnet.Mini, Helmholz Rex 100 Firmware, Helmholz Rex 100.