Vulnerability Details : CVE-2020-35566
An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2. An attacker can read arbitrary JSON files via Local File Inclusion.
Vulnerability category: File inclusion
Products affected by CVE-2020-35566
- cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*
- cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*
- cpe:2.3:a:helmholz:myrex24.virtual:*:*:*:*:*:*:*:*
- cpe:2.3:a:helmholz:myrex24:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-35566
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-35566
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
MITRE | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2020-35566
-
The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-35566
-
https://cert.vde.com/en/advisories/VDE-2021-003
VDE-2021-003 | CERT@VDEThird Party Advisory
-
https://mbconnectline.com/security-advice/
Security Advice - MB connect line GmbHVendor Advisory
-
https://cert.vde.com/en/advisories/VDE-2022-039
VDE-2022-039 | CERT@VDEThird Party Advisory
Jump to