CVE-2020-35558

7.5 HIGH

📋 TL;DR

This vulnerability is a Server-Side Request Forgery (SSRF) in the MySQL access check of MB connect line products, allowing attackers to scan internal network ports and potentially gather credential information. It affects mymbCONNECT24, mbCONNECT24, Helmholz myREX24, and myREX24.virtual installations. Attackers can exploit this to map internal networks and discover sensitive information.

💻 Affected Systems

Products:
  • mymbCONNECT24
  • mbCONNECT24
  • Helmholz myREX24
  • myREX24.virtual
Versions: through 2.11.2
Operating Systems: Not OS-specific - affects the application itself
Default Config Vulnerable: ⚠️ Yes
Notes: All installations up to version 2.11.2 are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map internal networks, discover credentials for other services, and potentially pivot to compromise additional systems.

🟠

Likely Case

Internal network reconnaissance leading to discovery of other vulnerable services and credential harvesting.

🟢

If Mitigated

Limited to port scanning and information gathering without direct system compromise.

🌐 Internet-Facing: HIGH - These products are typically internet-facing remote access solutions.
🏢 Internal Only: MEDIUM - Could be exploited from internal networks if accessible.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities are commonly exploited and tools exist for automated exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.11.2

Vendor Advisory: https://mbconnectline.com/security-advice/

Restart Required: Yes

Instructions:

1. Check current version. 2. Update to latest version from vendor. 3. Restart services. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to vulnerable systems and limit outbound connections

Firewall Rules

all

Block outbound connections from affected systems to internal networks

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems
  • Deploy web application firewall with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check application version in admin interface - if version is 2.11.2 or earlier, system is vulnerable.

Check Version:

Check via web admin interface or consult vendor documentation

Verify Fix Applied:

Verify version is updated to later than 2.11.2 and test SSRF functionality is blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound connection attempts from application server
  • Multiple connection attempts to internal IP ranges

Network Indicators:

  • Outbound connections from application server to unexpected internal services
  • Port scanning patterns originating from application server

SIEM Query:

source_ip=application_server AND (dest_port=3306 OR dest_port=1433 OR dest_port=5432) AND action=connection_attempt

🔗 References

📤 Share & Export