{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T22:38:31.670","vulnerabilities":[{"cve":{"id":"CVE-2023-4834","sourceIdentifier":"info@cert.vde.com","published":"2023-10-16T09:15:11.830","lastModified":"2024-11-21T08:36:04.223","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Red Lion Europe mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an improperly implemented access validation allows an authenticated, low privileged attacker to gain read access to limited, non-critical device information in his account he should not have access to.\n\n\n\n\t\t\t\t\t\n\n\n\t\t\t\t\n\n\n\t\t\t\n\n\n\t\t\n\n\n\t\n"},{"lang":"es","value":"En Red Lion Europe mbCONNECT24 y mymbCONNECT24 y Helmholz myREX24 y myREX24.virtual hasta la versión 2.14.2 incluida, una validación de acceso implementada incorrectamente permite a un atacante autenticado y con pocos privilegios obtener acceso de lectura a información limitada y no crítica del dispositivo a la que no debería tener acceso en su cuenta."}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:helmholz:myrex24:*:*:*:*:*:*:*:*","versionEndIncluding":"2.14.2","matchCriteriaId":"6B75F1E4-3DFA-4163-A9C7-8CF5C9A78562"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:helmholz:myrex24.virtual:*:*:*:*:*:*:*:*","versionEndIncluding":"2.14.2","matchCriteriaId":"885E9E11-89FE-468F-8160-EC3B21E6CA77"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*","versionEndIncluding":"2.14.2","matchCriteriaId":"2029F9FB-397A-490D-A86F-B2B39C516A79"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*","versionEndIncluding":"2.14.2","matchCriteriaId":"0F77AC2B-5B57-4CFF-A4F1-AA8E6B1B8C3B"}]}]}],"references":[{"url":"https://cert.vde.com/en/advisories/VDE-2023-041","source":"info@cert.vde.com","tags":["Third Party Advisory"]},{"url":"https://cert.vde.com/en/advisories/VDE-2023-043","source":"info@cert.vde.com","tags":["Third Party Advisory"]},{"url":"https://cert.vde.com/en/advisories/VDE-2023-041","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://cert.vde.com/en/advisories/VDE-2023-043","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}