Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.
References
Link | Resource |
---|---|
https://jvn.jp/vu/JVNVU96063959 | Third Party Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-138-02 | Mitigation Third Party Advisory US Government Resource |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-002_en.pdf | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Mitsubishi
Published: 2023-05-19T04:19:42.944Z
Updated: 2023-08-23T00:20:36.551Z
Reserved: 2023-03-24T08:06:05.810Z
Link: CVE-2023-1618
JSON object: View
NVD Information
Status : Modified
Published: 2023-05-19T05:15:20.350
Modified: 2023-08-23T01:15:09.957
Link: CVE-2023-1618
JSON object: View
Redhat Information
No data.