{"api_version":"1","generated_at":"2026-04-24T16:36:16+00:00","cve":"CVE-2023-3373","urls":{"html":"https://cve.report/CVE-2023-3373","api":"https://cve.report/api/cve/CVE-2023-3373.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-3373","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-3373"},"summary":{"title":"CVE-2023-3373","description":"Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it.","state":"PUBLIC","assigner":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","published_at":"2023-08-04 00:15:00","updated_at":"2023-08-10 14:59:00"},"problem_types":["CWE-330"],"metrics":[],"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-01","name":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-01","refsource":"MISC","tags":[],"title":"​Mitsubishi Electric GOT2000 and GOT SIMPLE | CISA","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://jvn.jp/vu/JVNVU92167394/index.html","name":"https://jvn.jp/vu/JVNVU92167394/index.html","refsource":"MISC","tags":[],"title":"JVNVU#92167394: 三菱電機製GOT2000シリーズおよびGOT SIMPLEシリーズのFTPサーバ機能にデータコネクションを待ち受けるポート番号を容易に推測可能な脆弱性","mime":"text/xml","httpstatus":"200","archivestatus":"404"},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-006_en.pdf","name":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-006_en.pdf","refsource":"MISC","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-3373","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3373","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"3373","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"mitsubishielectric","cpe5":"gs21","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"3373","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mitsubishielectric","cpe5":"gs21_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"3373","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"mitsubishielectric","cpe5":"gt21","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"3373","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mitsubishielectric","cpe5":"gt21_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-3373","ASSIGNER":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-342 Predictable Exact Value from Previous Values","cweId":"CWE-342"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Mitsubishi Electric Corporation","product":{"product_data":[{"product_name":"GOT2000 Series GT21 model","version":{"version_data":[{"version_affected":"=","version_value":"01.49.000 and prior"}]}},{"product_name":"GOT SIMPLE Series GS21 model","version":{"version_data":[{"version_affected":"=","version_value":"01.49.000 and prior"}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-006_en.pdf","refsource":"MISC","name":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-006_en.pdf"},{"url":"https://jvn.jp/vu/JVNVU92167394/index.html","refsource":"MISC","name":"https://jvn.jp/vu/JVNVU92167394/index.html"},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-01","refsource":"MISC","name":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-01"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L","version":"3.1"}]}},"nvd":{"publishedDate":"2023-08-04 00:15:00","lastModifiedDate":"2023-08-10 14:59:00","problem_types":["CWE-330"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:mitsubishielectric:gt21_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"01.50.000","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:mitsubishielectric:gt21:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:mitsubishielectric:gs21_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"01.50.000","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:mitsubishielectric:gs21:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}