First published: Mon Oct 28 2019(Updated: )
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Stored cleartext passwords could allow an unauthenticated attacker to obtain configured username and password combinations on the RTU due to the weak credentials management on the RTU. An unauthenticated user can obtain the exposed password credentials to gain access to the following services: DDNS service, Mobile Network Provider, and OpenVPN service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Smartrtu Firmware | <=2.02 | |
Mitsubishielectric Smartrtu | ||
Inea Me-rtu Firmware | <=3.0 | |
INEA ME-RTU | ||
All of | ||
Mitsubishielectric Smartrtu Firmware | <=2.02 | |
Mitsubishielectric Smartrtu | ||
All of | ||
Inea Me-rtu Firmware | <=3.0 | |
INEA ME-RTU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14929 is a vulnerability that affects Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. It allows an unauthenticated attacker to obtain configured username and password combinations due to weak credentials management.
CVE-2019-14929 has a severity rating of 9.8, which is considered critical.
CVE-2019-14929 affects Mitsubishi Electric ME-RTU devices through version 2.02.
CVE-2019-14929 affects INEA ME-RTU devices through version 3.0.
To mitigate CVE-2019-14929, it is recommended to implement strong credentials management on the affected devices.