CVE-2023-1618
Summary
| CVE | CVE-2023-1618 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-05-19 05:15:00 UTC |
| Updated | 2023-08-23 01:15:00 UTC |
| Description | Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware. |
Risk And Classification
Problem Types: CWE-1188
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Mitsubishielectric | Melsec Ws0-geth00200 | - | All | All | All |
| Operating System | Mitsubishielectric | Melsec Ws0-geth00200 Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| JVNVU#96063959: 三菱電機製MELSEC WSシリーズのEthernetインタフェースユニットに利用可能なデバッグ機能が存在している脆弱性 | MISC | jvn.jp | |
| Mitsubishi Electric MELSEC WS Series | CISA | MISC | www.cisa.gov | |
| www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-002_en.pdf | MISC | www.mitsubishielectric.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.