Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-35558 : Security Advisory and Response

Discover the SSRF vulnerability in MB connect line mymbCONNECT24, mbCONNECT24, and Helmholz myREX24 versions up to 2.11.2. Learn about the impact, affected systems, and mitigation steps.

An issue was discovered in MB connect line mymbCONNECT24, mbCONNECT24, and Helmholz myREX24 and myREX24.virtual through version 2.11.2, leading to SSRF vulnerability in the MySQL access check.

Understanding CVE-2020-35558

This CVE involves a Server-Side Request Forgery (SSRF) vulnerability in products of MB connect line and Helmholz.

What is CVE-2020-35558?

CVE-2020-35558 is a security vulnerability found in MB connect line mymbCONNECT24, mbCONNECT24, and Helmholz myREX24 and myREX24.virtual versions up to 2.11.2. The flaw allows attackers to perform SSRF attacks in the MySQL access check, potentially revealing sensitive information.

The Impact of CVE-2020-35558

The vulnerability has a CVSS base score of 7.5, indicating a high severity issue with a significant impact on confidentiality.

Technical Details of CVE-2020-35558

This section provides more in-depth technical insights into the CVE.

Vulnerability Description

The vulnerability allows attackers to scan for open ports and potentially access credentials through SSRF in the MySQL access check.

Affected Systems and Versions

        Products: MB connect line mymbCONNECT24, mbCONNECT24, Helmholz myREX24, myREX24.virtual
        Versions affected: Up to 2.11.2

Exploitation Mechanism

Attackers can exploit this vulnerability to scan for open ports and gather information about possible credentials by manipulating the MySQL access check.

Mitigation and Prevention

Protecting systems from CVE-2020-35558 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Update affected systems to version 2.12.1 to mitigate the vulnerability.

Long-Term Security Practices

        Implement network segmentation to limit the impact of SSRF attacks.
        Regularly monitor and audit network traffic to detect and prevent unauthorized access.

Patching and Updates

        Apply security patches promptly to address known vulnerabilities and enhance system security.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now