Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.
References
| Link | Resource |
|---|---|
| https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-002_en.pdf | Vendor Advisory |
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-138-02 | Mitigation Third Party Advisory US Government Resource |
| https://jvn.jp/vu/JVNVU96063959 | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Information
Published : 2023-05-19 05:15
Updated : 2023-08-23 01:15
NVD link : CVE-2023-1618
Mitre link : CVE-2023-1618
JSON object : View
Products Affected
mitsubishielectric
- melsec_ws0-geth00200
- melsec_ws0-geth00200_firmware
CWE
CWE-1188
Insecure Default Initialization of Resource
