{"api_version":"1","generated_at":"2026-04-14T02:00:17+00:00","cve":"CVE-2024-1573","urls":{"html":"https://cve.report/CVE-2024-1573","api":"https://cve.report/api/cve/CVE-2024-1573.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-1573","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-1573"},"summary":{"title":"CVE-2024-1573","description":"Missing Authentication for Critical Function vulnerability in the mobile monitoring feature of Mitsubishi Electric GENESIS64 versions 10.97.2 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.2 and prior, Mitsubishi Electric Hyper Historian versions 10.97.2 and prior, Mitsubishi Electric AnalytiX versions 10.97.2 and prior, Mitsubishi Electric MobileHMI versions 10.97.2 and prior, Mitsubishi Electric IoTWorX version 10.95, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.2 and prior, and Mitsubishi Electric Iconics Digital Solutions IoTWorX version 10.95 allows a remote unauthenticated attacker to bypass proper authentication and log in to the system when all of the following conditions are met: (1) Active Directory is used in the security setting (2) \"Automatic log in\" option is enabled in the security setting (3) The IcoAnyGlass IIS Application Pool is running under an Active Directory Domain Account. (4) The IcoAnyGlass IIS Application Pool account is included in GENESIS64, ICONCIS Suite, and MC Works64 Security and has permission to log in.","state":"PUBLISHED","assigner":"Mitsubishi","published_at":"2024-07-04 09:15:03","updated_at":"2026-04-13 23:16:26"},"problem_types":["CWE-306","CWE-306 CWE-306 Missing Authentication for Critical Function"],"metrics":[{"version":"3.1","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","score":"5.9","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"5.9","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","data":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2024-004_en.pdf","name":"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2024-004_en.pdf","refsource":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://jvn.jp/vu/JVNVU98894016/","name":"https://jvn.jp/vu/JVNVU98894016/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf","name":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03","name":"https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-1573","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1573","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"GENESIS64","version":"affected versions 10.97.2 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"GENESIS64","version":"affected versions 10.97.2 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"ICONICS Suite","version":"affected versions 10.97.2 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"ICONICS Suite","version":"affected versions 10.97.2 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"Hyper Historian","version":"affected versions 10.97.2 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"Hyper Historian","version":"affected versions 10.97.2 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"AnalytiX","version":"affected versions 10.97.2 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"AnalytiX","version":"affected versions 10.97.2 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"MobileHMI","version":"affected versions 10.97.2 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"MobileHMI","version":"affected versions 10.97.2 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"IoTWorX","version":"affected version 10.95","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"IoTWorX","version":"affected version 10.95","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"MC Works64","version":"affected all versions","platforms":[]},{"source":"ADP","vendor":"iconics","product":"genesis64","version":"affected 10.97 10.97.92 custom","platforms":[]},{"source":"ADP","vendor":"mitsubishielectric","product":"mc_works64","version":"affected * custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2024","cve_id":"1573","cve":"CVE-2024-1573","epss":"0.002430000","percentile":"0.475240000","score_date":"2026-04-13","updated_at":"2026-04-14 00:12:03"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"affected":[{"cpes":["cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"genesis64","vendor":"iconics","versions":[{"lessThan":"10.97.92","status":"affected","version":"10.97","versionType":"custom"}]},{"cpes":["cpe:2.3:a:mitsubishielectric:mc_works64:-:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"mc_works64","vendor":"mitsubishielectric","versions":[{"lessThanOrEqual":"*","status":"affected","version":"0","versionType":"custom"}]}],"metrics":[{"other":{"content":{"id":"CVE-2024-1573","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2024-07-05T14:46:51.356597Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2024-07-05T14:46:55.563Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2024-08-01T18:40:21.409Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf"},{"tags":["government-resource","x_transferred"],"url":"https://jvn.jp/vu/JVNVU98894016/"},{"tags":["government-resource","x_transferred"],"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03"}],"title":"CVE Program Container"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"GENESIS64","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.2 and prior"}]},{"defaultStatus":"unaffected","product":"GENESIS64","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.2 and prior"}]},{"defaultStatus":"unaffected","product":"ICONICS Suite","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.2 and prior"}]},{"defaultStatus":"unaffected","product":"ICONICS Suite","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.2 and prior"}]},{"defaultStatus":"unaffected","product":"Hyper Historian","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.2 and prior"}]},{"defaultStatus":"unaffected","product":"Hyper Historian","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.2 and prior"}]},{"defaultStatus":"unaffected","product":"AnalytiX","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.2 and prior"}]},{"defaultStatus":"unaffected","product":"AnalytiX","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.2 and prior"}]},{"defaultStatus":"unaffected","product":"MobileHMI","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.2 and prior"}]},{"defaultStatus":"unaffected","product":"MobileHMI","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.2 and prior"}]},{"defaultStatus":"unaffected","product":"IoTWorX","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"version 10.95"}]},{"defaultStatus":"unaffected","product":"IoTWorX","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"version 10.95"}]},{"defaultStatus":"unaffected","product":"MC Works64","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"all versions"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Missing Authentication for Critical Function vulnerability in the mobile monitoring feature of Mitsubishi Electric GENESIS64 versions 10.97.2 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.2 and prior, Mitsubishi Electric Hyper Historian versions 10.97.2 and prior, Mitsubishi Electric AnalytiX versions 10.97.2 and prior, Mitsubishi Electric MobileHMI versions 10.97.2 and prior, Mitsubishi Electric IoTWorX version 10.95, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.2 and prior, and Mitsubishi Electric Iconics Digital Solutions IoTWorX version 10.95 allows a remote unauthenticated attacker to bypass proper authentication and log in to the system when all of the following conditions are met: (1) Active Directory is used in the security setting (2) \"Automatic log in\" option is enabled in the security setting (3) The IcoAnyGlass IIS Application Pool is running under an Active Directory Domain Account. (4) The IcoAnyGlass IIS Application Pool account is included in GENESIS64, ICONCIS Suite, and MC Works64 Security and has permission to log in."}],"value":"Missing Authentication for Critical Function vulnerability in the mobile monitoring feature of Mitsubishi Electric GENESIS64 versions 10.97.2 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.2 and prior, Mitsubishi Electric Hyper Historian versions 10.97.2 and prior, Mitsubishi Electric AnalytiX versions 10.97.2 and prior, Mitsubishi Electric MobileHMI versions 10.97.2 and prior, Mitsubishi Electric IoTWorX version 10.95, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.2 and prior, and Mitsubishi Electric Iconics Digital Solutions IoTWorX version 10.95 allows a remote unauthenticated attacker to bypass proper authentication and log in to the system when all of the following conditions are met: (1) Active Directory is used in the security setting (2) \"Automatic log in\" option is enabled in the security setting (3) The IcoAnyGlass IIS Application Pool is running under an Active Directory Domain Account. (4) The IcoAnyGlass IIS Application Pool account is included in GENESIS64, ICONCIS Suite, and MC Works64 Security and has permission to log in."}],"impacts":[{"capecId":"CAPEC-115","descriptions":[{"lang":"en","value":"CAPEC-115 Authentication Bypass"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-306","description":"CWE-306 Missing Authentication for Critical Function","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-13T22:47:17.575Z","orgId":"e0f77b61-78fd-4786-b3fb-1ee347a748ad","shortName":"Mitsubishi"},"references":[{"tags":["vendor-advisory"],"url":"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2024-004_en.pdf"},{"tags":["government-resource"],"url":"https://jvn.jp/vu/JVNVU98894016/"},{"tags":["government-resource"],"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}}},"cveMetadata":{"assignerOrgId":"e0f77b61-78fd-4786-b3fb-1ee347a748ad","assignerShortName":"Mitsubishi","cveId":"CVE-2024-1573","datePublished":"2024-07-04T08:59:44.079Z","dateReserved":"2024-02-16T01:30:41.285Z","dateUpdated":"2026-04-13T22:47:17.575Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-07-04 09:15:03","lastModifiedDate":"2026-04-13 23:16:26","problem_types":["CWE-306","CWE-306 CWE-306 Missing Authentication for Critical Function"],"metrics":{"cvssMetricV31":[{"source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"1573","Ordinal":"1","Title":"CVE-2024-1573","CVE":"CVE-2024-1573","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"1573","Ordinal":"1","NoteData":"Missing Authentication for Critical Function vulnerability in the mobile monitoring feature of Mitsubishi Electric GENESIS64 versions 10.97.2 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.2 and prior, Mitsubishi Electric Hyper Historian versions 10.97.2 and prior, Mitsubishi Electric AnalytiX versions 10.97.2 and prior, Mitsubishi Electric MobileHMI versions 10.97.2 and prior, Mitsubishi Electric IoTWorX version 10.95, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.2 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.2 and prior, and Mitsubishi Electric Iconics Digital Solutions IoTWorX version 10.95 allows a remote unauthenticated attacker to bypass proper authentication and log in to the system when all of the following conditions are met: (1) Active Directory is used in the security setting (2) \"Automatic log in\" option is enabled in the security setting (3) The IcoAnyGlass IIS Application Pool is running under an Active Directory Domain Account. (4) The IcoAnyGlass IIS Application Pool account is included in GENESIS64, ICONCIS Suite, and MC Works64 Security and has permission to log in.","Type":"Description","Title":"CVE-2024-1573"}]}}}