CVE-2020-35567

7.8 HIGH

📋 TL;DR

This vulnerability involves MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software using a hardcoded database password shared across all installations. Attackers who discover this password can access the application database, potentially compromising sensitive data. All users running affected versions are impacted.

💻 Affected Systems

Products:
  • MB CONNECT LINE mymbCONNECT24
  • MB CONNECT LINE mbCONNECT24
Versions: through 2.6.2
Operating Systems: Not specified, likely various
Default Config Vulnerable: ⚠️ Yes
Notes: All instances share the same hardcoded database password, making every installation vulnerable if the password is discovered.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, manipulation, or deletion; potential lateral movement to other systems if database contains credentials.

🟠

Likely Case

Unauthorized database access allowing attackers to read or modify configuration data, user information, or other stored sensitive information.

🟢

If Mitigated

Limited impact if database is isolated with network controls and minimal sensitive data, though password exposure remains a risk.

🌐 Internet-Facing: HIGH if database is accessible from internet; attackers can directly exploit the shared password.
🏢 Internal Only: MEDIUM if database is internal-only; still vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires discovering the shared password, which could be obtained through reverse engineering, leaks, or other means. Once obtained, attackers can directly connect to the database.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.6.2

Vendor Advisory: https://mbconnectline.com/security-advice/

Restart Required: Yes

Instructions:

1. Update to a version beyond 2.6.2. 2. Follow vendor instructions to apply the patch. 3. Restart the application services. 4. Verify the database password has been changed to a unique, strong password.

🔧 Temporary Workarounds

Change Database Password Manually

all

Manually change the database password to a unique, strong password and update the application configuration.

Specific commands depend on database type and OS; consult vendor documentation for password change procedures.

Network Isolation

linux

Restrict database access to only the application server using firewall rules or network segmentation.

Example for Linux iptables: iptables -A INPUT -p tcp --dport [DB_PORT] -s [APP_SERVER_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [DB_PORT] -j DROP

🧯 If You Can't Patch

  • Isolate the database server from untrusted networks using firewalls or VLANs.
  • Implement database auditing and monitoring to detect unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check the software version; if it is 2.6.2 or earlier, it is vulnerable. Review configuration files for hardcoded passwords.

Check Version:

Consult vendor documentation for version check command; typically via web interface or configuration files.

Verify Fix Applied:

Confirm the software version is beyond 2.6.2 and that the database password has been changed to a unique value not shared with other instances.

📡 Detection & Monitoring

Log Indicators:

  • Failed or successful database login attempts from unexpected IP addresses
  • Unusual database queries or access patterns

Network Indicators:

  • Database connection attempts from unauthorized sources
  • Traffic to database port from non-application servers

SIEM Query:

Example: 'sourceIP != [APP_SERVER_IP] AND destinationPort == [DB_PORT]'

🔗 References

📤 Share & Export