Description
Due to the improper neutralisation of special elements used in an OS command, an unauthenticated remote attacker can exploit an RCE vulnerability in the com_mb24sysapi module, resulting in full system compromise. This vulnerability is a variant attack for CVE-2020-10383.
Published: 2026-03-23
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from the improper neutralisation of special elements used in an operating‑system command within the com_mb24sysapi module. An unauthenticated remote attacker can craft a request that bypasses input filtering, causing the module to execute arbitrary OS commands with the privileges of the running process. If exploited, the attacker can achieve full system compromise, consistent with a remote code execution scenario. This flaw is a variant of the earlier CVE‑2020‑10383 vulnerability, highlighting a repeated weakness in the same code base.

Affected Systems

The affected products include Helmholz's myREX24V2 and myREX24V2.virtual as well as MB Connect Line’s mbCONNECT24 and mymbCONNECT24. No specific firmware or software version numbers are supplied, so all current releases of these products are considered vulnerable until vendors confirm a fix.

Risk and Exploitability

The CVSS score is 9.8, indicating an extremely severe risk. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, though that does not reduce its potential impact. The likely attack vector is a remote, unauthenticated exploitation through the exposed com_mb24sysapi interface, which can be triggered from any network that can reach the device. Given the high severity and the nature of the flaw, the window of opportunity for attackers is substantial.

Generated by OpenCVE AI on March 23, 2026 at 12:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the vendor‑released firmware or patch that resolves the com_mb24sysapi RCE issue for the affected Helmholz and MB Connect Line devices.
  • If a patch is not yet available, isolate the devices by blocking external access to the com_mb24sysapi endpoint using firewall or network segmentation until a fix can be applied.
  • Enable logging on the affected devices and monitor for anomalous command execution or unusual network activity associated with the com_mb24sysapi module; report any suspicious events to the vendor and to the security team.

Generated by OpenCVE AI on March 23, 2026 at 12:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Helmholz
Helmholz myrex24.virtual
Helmholz myrex24 V2
Mb Connect Line
Mb Connect Line mb Connect Line Mbconnect24
Mbconnectline
Mbconnectline mymbconnect24
Vendors & Products Helmholz
Helmholz myrex24.virtual
Helmholz myrex24 V2
Mb Connect Line
Mb Connect Line mb Connect Line Mbconnect24
Mbconnectline
Mbconnectline mymbconnect24

Mon, 23 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 11:45:00 +0000

Type Values Removed Values Added
Description Due to the improper neutralisation of special elements used in an OS command, an unauthenticated remote attacker can exploit an RCE vulnerability in the com_mb24sysapi module, resulting in full system compromise. This vulnerability is a variant attack for CVE-2020-10383.
Title Unauthenticated RCE in com_mb24sysapi
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Helmholz Myrex24.virtual Myrex24 V2
Mb Connect Line Mb Connect Line Mbconnect24
Mbconnectline Mymbconnect24
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-03-23T13:51:18.931Z

Reserved: 2026-03-17T09:55:21.859Z

Link: CVE-2026-32968

cve-icon Vulnrichment

Updated: 2026-03-23T13:51:14.717Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-23T12:16:08.407

Modified: 2026-03-23T14:31:37.267

Link: CVE-2026-32968

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:49:19Z

Weaknesses