{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T08:08:46.954","vulnerabilities":[{"cve":{"id":"CVE-2024-45272","sourceIdentifier":"info@cert.vde.com","published":"2024-10-15T11:15:11.673","lastModified":"2024-11-21T09:37:35.310","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost."},{"lang":"es","value":"Un atacante remoto no autenticado puede realizar un ataque de fuerza bruta a las credenciales del portal de servicio remoto con una alta probabilidad de éxito, lo que da como resultado la pérdida de la conexión."}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1391"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:helmholz:myrex24_v2_virtual_server:*:*:*:*:*:*:*:*","versionEndExcluding":"2.16.3","matchCriteriaId":"5D5B73E2-38BA-415D-96AF-D0F835E3C9BC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:helmholz:rex_300_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"5.1.11","matchCriteriaId":"05CB17C2-1B86-41AA-8737-718BA9464BB0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:helmholz:rex_300:-:*:*:*:*:*:*:*","matchCriteriaId":"DB65F958-3FF4-48A7-8007-406A7FDBA0E7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:helmholz:rex_200_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"8.2.1","matchCriteriaId":"EE10F9E9-A0EE-4CF1-9F4B-6AF4179ED03E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:helmholz:rex_200:-:*:*:*:*:*:*:*","matchCriteriaId":"28B3785D-8EFF-4A67-88F1-8F9D0EC39D6C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:helmholz:rex_250_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"8.2.1","matchCriteriaId":"67ECB608-F99D-479C-95CC-349DCB530D98"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:helmholz:rex_250:-:*:*:*:*:*:*:*","matchCriteriaId":"53454815-3E7A-4097-8FC7-2F7634DAF7E1"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*","versionEndExcluding":"2.16.3","matchCriteriaId":"9F017673-3A54-4D92-811F-AE395CCED7CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*","versionEndExcluding":"2.16.3","matchCriteriaId":"18BC8E52-E277-4D72-903A-A31FC658B6E2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mbconnectline:mbspider_mdh_905_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.6.5","matchCriteriaId":"188A4550-AE25-459E-9624-97090842230B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mbconnectline:mbspider_mdh_905:-:*:*:*:*:*:*:*","matchCriteriaId":"5ABBF6FE-BF26-43B2-B54C-6ECE4234B3C9"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mbconnectline:mbspider_mdh_915_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.6.5","matchCriteriaId":"3CAEA6C5-27F5-4BA5-BEB4-DD2EDE66F877"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mbconnectline:mbspider_mdh_915:-:*:*:*:*:*:*:*","matchCriteriaId":"ED665544-6D67-465A-8850-6FD7A44D9E6F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mbconnectline:mbspider_mdh_906_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.6.5","matchCriteriaId":"E41557B9-9BE2-4286-A1FE-88CDAD14B824"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mbconnectline:mbspider_mdh_906:-:*:*:*:*:*:*:*","matchCriteriaId":"63B499C3-0C59-488D-89E7-2CBEEA42E1E9"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mbconnectline:mbspider_mdh_916_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.6.5","matchCriteriaId":"75321482-BFC4-4D37-AF03-9212AE6028A7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mbconnectline:mbspider_mdh_916:-:*:*:*:*:*:*:*","matchCriteriaId":"B74973FF-4DC9-4076-A161-28EC0A5F5E6D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mbconnectline:mbnet_hw1_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"5.1.11","matchCriteriaId":"7470E3A2-72C5-4743-ABC2-14FB4C9F02D8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mbconnectline:mbnet_hw1:-:*:*:*:*:*:*:*","matchCriteriaId":"83E49632-8868-4BF8-A86D-E7F10130B378"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mbconnectline:mbnet_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"8.2.1","matchCriteriaId":"40166B67-481E-4B36-BBD8-4F5721B75B9E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mbconnectline:mbnet:-:*:*:*:*:*:*:*","matchCriteriaId":"4D8CB051-1E1A-4014-9FB2-4473AC4CEE30"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mbconnectline:mbnet.rokey_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"8.2.1","matchCriteriaId":"2AE59454-A9F9-44BE-8B06-9A631332A4E9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mbconnectline:mbnet.rokey:-:*:*:*:*:*:*:*","matchCriteriaId":"CC7B6E4C-1AC2-4CD8-A056-2EF8845622CA"}]}]}],"references":[{"url":"https://cert.vde.com/en/advisories/VDE-2024-068","source":"info@cert.vde.com","tags":["Third Party Advisory"]},{"url":"https://cert.vde.com/en/advisories/VDE-2024-069","source":"info@cert.vde.com","tags":["Third Party Advisory"]},{"url":"https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-061.txt","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}