9.1
CVE-2024-49388 -
Sensitive information manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
7.5
CVE-2024-49387 -
Cleartext transmission of sensitive information in acep-collector service. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
4.3
CVE-2024-49384 -
Excessive attack surface in acep-collector service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
4.3
CVE-2024-49383 -
Excessive attack surface in acep-importer service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
4.3
CVE-2024-49382 -
Excessive attack surface in archive-server service due to binding to an unrestricted IP address. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 38690.
7.5
CVE-2024-45276 - MB connect line/Helmholz: tmp directory exposed via webservice
An unauthenticated remote attacker can get read access to files in the "/tmp" directory due to missing authentication.
9.8
CVE-2024-45275 - MB connect line/Helmholz: Hardcoded user accounts with hard-coded passwords
The devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices.
9.8
CVE-2024-45274 - MB connect line/Helmholz: Remote code execution via confnet service
An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.
8.4
CVE-2024-45273 - MB connect line/Helmholz: Weak encryption of configuration file
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
7.5
CVE-2024-45272 - MB connect line/Helmholz: Generation of weak passwords vulnerability
An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.