Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2024-10-15 CVE-2024-45271 An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.
local
low complexity
mbconnectline helmholz
7.8
2024-10-15 CVE-2024-45272 An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.
network
low complexity
helmholz mbconnectline
7.5
2024-10-15 CVE-2024-45273 Inadequate Encryption Strength vulnerability in multiple products
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
local
low complexity
mbconnectline helmholz CWE-326
7.8
2024-10-15 CVE-2024-45274 Missing Authentication for Critical Function vulnerability in multiple products
An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.
network
low complexity
mbconnectline helmholz CWE-306
critical
9.8
2024-10-15 CVE-2024-45275 Use of Hard-coded Credentials vulnerability in multiple products
The devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices.
network
low complexity
mbconnectline helmholz CWE-798
critical
9.8
2024-10-15 CVE-2024-47674 Incomplete Cleanup vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors.
local
low complexity
linux CWE-459
5.5
2024-10-15 CVE-2024-49382 Unspecified vulnerability in Acronis Cyber Protect 16
Excessive attack surface in archive-server service due to binding to an unrestricted IP address.
low complexity
acronis
4.3
2024-10-15 CVE-2024-49383 Unspecified vulnerability in Acronis Cyber Protect 16
Excessive attack surface in acep-importer service due to binding to an unrestricted IP address.
low complexity
acronis
4.3
2024-10-15 CVE-2024-49384 Unspecified vulnerability in Acronis Cyber Protect 16
Excessive attack surface in acep-collector service due to binding to an unrestricted IP address.
low complexity
acronis
4.3
2024-10-15 CVE-2024-49387 Cleartext Transmission of Sensitive Information vulnerability in Acronis Cyber Protect 16
Cleartext transmission of sensitive information in acep-collector service.
network
low complexity
acronis CWE-319
7.5