An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
| Software | From | Fixed in |
|---|---|---|
| mbconnectline / mbnet.mini_firmware | - | 2.3.1 |
| helmholz / myrex24_v2_virtual_server | - | 2.16.3 |
| helmholz / rex_300_firmware | - | 5.1.11.x |
| helmholz / rex_200_firmware | - | 8.2.1 |
| helmholz / rex_250_firmware | - | 8.2.1 |
| helmholz / rex_100_firmware | - | 2.3.1 |
| mbconnectline / mbconnect24 | - | 2.16.3 |
| mbconnectline / mymbconnect24 | - | 2.16.3 |
| mbconnectline / mbspider_mdh_905_firmware | - | 2.6.5.x |
| mbconnectline / mbspider_mdh_915_firmware | - | 2.6.5.x |
| mbconnectline / mbspider_mdh_906_firmware | - | 2.6.5.x |
| mbconnectline / mbspider_mdh_916_firmware | - | 2.6.5.x |
| mbconnectline / mbnet_hw1_firmware | - | 5.1.11.x |
| mbconnectline / mbnet_firmware | - | 8.2.1 |
| mbconnectline / mbnet.rokey_firmware | - | 8.2.1 |