First published: Mon Oct 28 2019(Updated: )
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Hard-coded SSH keys allow an attacker to gain unauthorised access or disclose encrypted data on the RTU due to the keys not being regenerated on initial installation or with firmware updates. In other words, these devices use private-key values in /etc/ssh/ssh_host_rsa_key, /etc/ssh/ssh_host_ecdsa_key, and /etc/ssh/ssh_host_dsa_key files that are publicly available from the vendor web sites.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Smartrtu Firmware | <=2.02 | |
Mitsubishielectric Smartrtu | ||
Inea Me-rtu Firmware | <=3.0 | |
INEA ME-RTU | ||
All of | ||
Mitsubishielectric Smartrtu Firmware | <=2.02 | |
Mitsubishielectric Smartrtu | ||
All of | ||
Inea Me-rtu Firmware | <=3.0 | |
INEA ME-RTU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14926 is a vulnerability discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0.
CVE-2019-14926 has a severity score of 9.8, which is considered critical.
CVE-2019-14926 allows an attacker to gain unauthorized access or disclose encrypted data on the RTU.
Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0 are affected by CVE-2019-14926.
To mitigate CVE-2019-14926, it is recommended to regenerate the SSH keys on initial installation or with firmware updates.