{"api_version":"1","generated_at":"2026-04-24T16:38:00+00:00","cve":"CVE-2023-1618","urls":{"html":"https://cve.report/CVE-2023-1618","api":"https://cve.report/api/cve/CVE-2023-1618.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-1618","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-1618"},"summary":{"title":"CVE-2023-1618","description":"Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.","state":"PUBLIC","assigner":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","published_at":"2023-05-19 05:15:00","updated_at":"2023-08-23 01:15:00"},"problem_types":["CWE-1188"],"metrics":[],"references":[{"url":"https://jvn.jp/vu/JVNVU96063959","name":"https://jvn.jp/vu/JVNVU96063959","refsource":"MISC","tags":[],"title":"JVNVU#96063959: 三菱電機製MELSEC WSシリーズのEthernetインタフェースユニットに利用可能なデバッグ機能が存在している脆弱性","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-138-02","name":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-138-02","refsource":"MISC","tags":[],"title":"Mitsubishi Electric MELSEC WS Series | CISA","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-002_en.pdf","name":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-002_en.pdf","refsource":"MISC","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-1618","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1618","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"1618","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"mitsubishielectric","cpe5":"melsec_ws0-geth00200","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"1618","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mitsubishielectric","cpe5":"melsec_ws0-geth00200_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-1618","ASSIGNER":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-489 Active Debug Code","cweId":"CWE-489"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Mitsubishi Electric Corporation","product":{"product_data":[{"product_name":"MELSEC WS Series WS0-GETH00200","version":{"version_data":[{"version_affected":"=","version_value":"Serial number 2310 **** and prior"}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-002_en.pdf","refsource":"MISC","name":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-002_en.pdf"},{"url":"https://jvn.jp/vu/JVNVU96063959","refsource":"MISC","name":"https://jvn.jp/vu/JVNVU96063959"},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-138-02","refsource":"MISC","name":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-138-02"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-05-19 05:15:00","lastModifiedDate":"2023-08-23 01:15:00","problem_types":["CWE-1188"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"LOW","baseScore":8.6,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:mitsubishielectric:melsec_ws0-geth00200_firmware:*:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:mitsubishielectric:melsec_ws0-geth00200:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}