First published: Mon Feb 13 2017(Updated: )
An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. Weakly encrypted passwords are transmitted to a MELSEC-Q PLC.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishi Electric QJ71E71-100 Firmware | ||
Mitsubishi Electric QJ71E71-100 Firmware | ||
Mitsubishi Electric QJ71E71-B5 | ||
Mitsubishi Electric QJ71E71-B5 | ||
Mitsubishi Electric QJ71E71-B2 Firmware | ||
Mitsubishi Electric QJ71E71-B2 Firmware | ||
All of | ||
Mitsubishi Electric QJ71E71-100 Firmware | ||
Mitsubishi Electric QJ71E71-100 Firmware | ||
All of | ||
Mitsubishi Electric QJ71E71-B5 | ||
Mitsubishi Electric QJ71E71-B5 | ||
All of | ||
Mitsubishi Electric QJ71E71-B2 Firmware | ||
Mitsubishi Electric QJ71E71-B2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8370 is rated as a medium severity vulnerability due to the transmission of weakly encrypted passwords.
To mitigate CVE-2016-8370, update the firmware of the affected Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules to the latest version that addresses the issue.
CVE-2016-8370 affects the Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, QJ71E71-B5, and QJ71E71-B2.
The impact of CVE-2016-8370 is that attackers could potentially intercept and decipher weakly encrypted passwords, leading to unauthorized access.
Currently, the recommended workaround for CVE-2016-8370 is to disable remote access to the affected modules when possible until the firmware is updated.