cve/2023/CVE-2023-4834.md
2024-05-25 21:48:12 +02:00

21 lines
1.1 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2023-4834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4834)
![](https://img.shields.io/static/v1?label=Product&message=mbCONNECT24&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=myREX24&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=myREX24.virtual&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=mymbCONNECT24&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%202.14.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%20Improper%20Privilege%20Management&color=brighgreen)
### Description
In Red Lion Europe mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an improperly implemented access validation allows an authenticated, low privileged attacker to gain read access to limited, non-critical device information in his account he should not have access to.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds