cve/2023/CVE-2023-4834.md

21 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-4834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4834)
![](https://img.shields.io/static/v1?label=Product&message=mbCONNECT24&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=myREX24&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=myREX24.virtual&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=mymbCONNECT24&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%202.14.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%20Improper%20Privilege%20Management&color=brighgreen)
### Description
In Red Lion Europe mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an improperly implemented access validation allows an authenticated, low privileged attacker to gain read access to limited, non-critical device information in his account he should not have access to.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds