
CBRE
Operating across every dimension of commercial real estate, CBRE sees more so you can do more.



Operating across every dimension of commercial real estate, CBRE sees more so you can do more.

MEB’S ability to create value for both clients and residents has been the cornerstone of our success. Scott, Libby, Mark, and Jodi have been active in the real estate management industry and have over 125 years of combined experience. With their breadth and depth of knowledge, MEB is the “go-to” company for a diverse group of investors, providing management services to over 25,000 rental households and over 1,000,000 square feet of commercial property. MEB is based in Arizona with offices in Phoenix, Tucson, Flagstaff and provides management services throughout the Southwest and Midwest. We are over 600 team members strong and provide management, consulting, receivership and rehab services for all types and asset classes of rental housing including: Luxury Apartment and Rental Home Communities Work Force Apartments and Rental Homes Student-Oriented Communities Affordable, LIHTC, and HUD Communities Active Senior Housing Value-Add Opportunities We are privileged to provide service to a large and diverse group of clients that include individual and institutional investors, lenders, and special servicers. Every MEB team member is focused on creating value for our clients, residents, and fellow team members. It is our core purpose as a company and is embraced at every level of our organization.
Security & Compliance Standards Overview












No incidents recorded for CBRE in 2025.
No incidents recorded for MEB Management Services (Morrison, Ekre & Bart Management Services) in 2025.
CBRE cyber incidents detection timeline including parent company and subsidiaries
MEB Management Services (Morrison, Ekre & Bart Management Services) cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).