Skip to main content

CVE-2025-3090: CWE-306 Missing Authentication for Critical Function in MB connect line mbCONNECT24

High
VulnerabilityCVE-2025-3090cvecve-2025-3090cwe-306
Published: Tue Jun 24 2025 (06/24/2025, 08:05:15 UTC)
Source: CVE Database V5
Vendor/Project: MB connect line
Product: mbCONNECT24

Description

An unauthenticated remote attacker can obtain limited sensitive information and/or DoS the device due to missing authentication for critical function.

AI-Powered Analysis

AILast updated: 06/24/2025, 08:24:47 UTC

Technical Analysis

CVE-2025-3090 is a high-severity vulnerability identified in the mbCONNECT24 product by MB connect line, classified under CWE-306: Missing Authentication for Critical Function. This vulnerability allows an unauthenticated remote attacker to invoke a critical function on the device without any authentication checks. As a result, the attacker can obtain limited sensitive information and/or cause a denial-of-service (DoS) condition on the affected device. The vulnerability is remotely exploitable over the network (Attack Vector: Network) with low attack complexity, requiring no privileges or user interaction. The CVSS v3.1 base score is 8.2, reflecting a high impact primarily on availability (DoS) and a limited impact on confidentiality (disclosure of some sensitive information). The vulnerability affects version 0 of mbCONNECT24, a product used for remote device management and industrial connectivity. No patches or known exploits in the wild are currently reported. The lack of authentication on critical functions indicates a fundamental security design flaw, potentially exposing industrial control systems or remote management infrastructure to disruption or information leakage.

Potential Impact

For European organizations, especially those in industrial sectors such as manufacturing, energy, and critical infrastructure, this vulnerability poses a significant risk. mbCONNECT24 is commonly used for remote monitoring and management of industrial devices, meaning exploitation could disrupt operational technology (OT) environments. The DoS impact could lead to downtime of critical systems, affecting production lines or utility services, causing financial losses and safety concerns. The limited sensitive information disclosure could aid attackers in reconnaissance for further attacks. Given the remote and unauthenticated nature of the exploit, attackers can easily target exposed devices without needing credentials or user interaction, increasing the likelihood of successful attacks. This vulnerability could also be leveraged in coordinated attacks against European industrial networks, potentially impacting supply chains and critical services.

Mitigation Recommendations

1. Immediate network-level protections: Restrict access to mbCONNECT24 devices by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks, especially the internet. 2. Deploy VPNs or secure tunnels for remote access to ensure authentication and encryption at the network layer. 3. Monitor network traffic for unusual patterns or repeated access attempts targeting mbCONNECT24 devices to detect potential exploitation attempts early. 4. Engage with MB connect line for official patches or firmware updates addressing this vulnerability; if unavailable, consider temporary device isolation or replacement. 5. Implement compensating controls such as intrusion detection/prevention systems (IDS/IPS) tailored to detect exploitation attempts of this specific vulnerability. 6. Conduct thorough asset inventories to identify all mbCONNECT24 instances and prioritize remediation based on criticality. 7. Educate operational technology and IT teams about this vulnerability to ensure rapid response and incident handling.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-01T13:41:20.503Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685a5d42dec26fc862d9446e

Added to database: 6/24/2025, 8:09:38 AM

Last enriched: 6/24/2025, 8:24:47 AM

Last updated: 8/15/2025, 7:08:51 AM

Views: 45

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats