Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.
References
Link | Resource |
---|---|
https://jvn.jp/vu/JVNVU96063959 | Third Party Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-138-02 | Mitigation Third Party Advisory US Government Resource |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-002_en.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-05-19 05:15
Updated : 2023-08-23 01:15
NVD link : CVE-2023-1618
Mitre link : CVE-2023-1618
CVE.ORG link : CVE-2023-1618
JSON object : View
Products Affected
mitsubishielectric
- melsec_ws0-geth00200_firmware
- melsec_ws0-geth00200