First published: Fri Oct 15 2021(Updated: )
Mitsubishi Electric Europe B.V. SmartRTU devices allow remote attackers to obtain sensitive information (directory listing and source code) via a direct request to the /web URI.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Smartrtu Firmware | ||
Mitsubishielectric Smartrtu | ||
All of | ||
Mitsubishielectric Smartrtu | ||
Mitsubishielectric Smartrtu Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Mitsubishi Electric SmartRTU vulnerability is CVE-2018-16060.
CVE-2018-16060 has a severity rating of 7.5 (high).
Remote attackers can exploit CVE-2018-16060 by making a direct request to the /web URI to obtain sensitive information, such as directory listings and source code.
The affected software for CVE-2018-16060 is Mitsubishi Electric SmartRTU firmware.
Yes, Mitsubishi Electric SmartRTU devices are vulnerable to CVE-2018-16060.
To fix CVE-2018-16060, it is recommended to apply any available patches or firmware updates provided by Mitsubishi Electric.
You can find more information about CVE-2018-16060 at the following references: [Link 1](http://packetstormsecurity.com/files/164538/Mitsubishi-Electric-INEA-SmartRTU-Source-Code-Disclosure.html), [Link 2](https://drive.google.com/open?id=1QMHwTnBbIqrTkR0NEpnTKssYdi8vRsHH).